08th week of 2012 patent applcation highlights part 52 |
Patent application number | Title | Published |
20120047539 | AUTOMATIC MOBILE IMAGE DIARY BACKUP AND DISPLAY - A method performed by a user device connected to a content server, via a public network, that includes sending, to a digital video recorder (DVR) server and via the public network, a request to display images on a display device associated with a local server; receiving, from the DVR server and via the public network, a notification to upload the images, the notification including an address for the content server; selecting a group of images stored on the user device; sending, to the content server and based on the address, the group of images; and sending, to the local server and via a local network, a notification to retrieve the group of images from the content server for display on the display device. | 2012-02-23 |
20120047540 | LODGING ENTERTAINMENT APPARATUS AND METHOD FOR USE OF SAME - A lodging entertainment apparatus and method for use of the same are disclosed. In one embodiment of the lodging entertainment apparatus, a memory is located within a housing and configured to store hospitality content which includes events, channel guide, and amenities relative the lodging establishment. An input is configured to receive an existing video signal that originates independently of the lodging entertainment apparatus and including content differing from hospitality content. An output is configured to independently transmit the hospitality content and the existing video signal. A user interface is configured to receive instructions from a user. A processor is located within the housing and communicatively coupled to the input, the output, the memory, and the user interface. The processor selectively provides the hospitality content in response to a power ON condition of the lodging entertainment apparatus. | 2012-02-23 |
20120047541 | CONTENT MEDIATION SERVER, CONTENT PLAYBACK DEVICE, AND CONTENT PLAYBACK SYSTEM - A content mediation server | 2012-02-23 |
20120047542 | System and method for rule based dynamic server side streaming manifest files - There is provided a system and method for rule-based dynamic server-side streaming manifest files. There is provided a method comprising receiving a request to provide a first video content for playback, evaluating a plurality of rules for the first video content, generating a dynamic manifest file referencing the first video content, and providing the dynamic manifest file in response to the request, thereby enabling an application to playback the first video content for output on a display by interpreting the dynamic manifest file. The rules may implement various features such as dynamic advertisement insertion, load balancing, client customization, user and device targeting, enhanced security mechanisms, global announcements, and others. As streaming protocols are widely supported by default on many client platforms, the dynamic manifest files can be utilized in a user friendly and transparent manner compared to client-side solutions requiring cumbersome client software installations. | 2012-02-23 |
20120047543 | COMMUNICATION DEVICE AND METHOD FOR ESTABLISHING VIDEO COMMUNICATION - A method for establishing a video communication using a communication device includes sending local audio signals to the remote communication device, receiving response audio signals from the remote communication device. The method further includes controlling the local UPnP set-top box to send local video signals to the remote UPnP set-top box according to the IP address of the remote UPnP set-top box, controlling the local UPnP set-top box to receive response video signals from the remote UPnP set-top box. | 2012-02-23 |
20120047544 | SYSTEM AND METHOD FOR DETECTING SIGNAL INGRESS INTERFERENCES - A system and method for detecting and geo-locating signal ingress interferences in a cable distribution network comprising a head station for transmitting content to subscribers at frequencies within a network bandwidth. The system comprises a vehicle mounted geo-locating device for generating geo-location data indicating the geographical position of a vehicle, and a vehicle mounted transmitter for transmitting a radio-frequency signal comprising said geo-location data at a frequency within the network bandwidth as the vehicle travels within the geographical area of the network. If an ingress exists in the network, the ingress signal sent from onboard the vehicle would leak into the network to be received and detected by a receiver at the head station of the cable distribution network. A server is used to process the data extracted by the receiver to produces reports and maps reflecting ingress points in a geographical area. | 2012-02-23 |
20120047545 | TOPOGRAPHIC FRAUD DETECTION - Methods and systems to detect topographic fraud are provided herein. The system includes a Cable Modem Termination System (CMTS) to periodically poll active cable modems and generate polling data. The system also includes a processor and a memory coupled to the CMTS. The processor is configured to, based on instructions in the memory, periodically determine a current geographic location for each polled cable modem based on the polling data from the CMTS, determine a geographic radius within which each polled cable modem is to be operated in and determine cable modems whose current geographic location is outside of their geographic radius. | 2012-02-23 |
20120047546 | MEDIA DISTRIBUTION NETWORK, COMPONENTS AND METHODS THEREFOR - The present invention relates to media distribution network, media reproduction unit, and methods therein. A preferred form of the present invention relates to an overlay network and associated devices and methods for the distribution of audio visual media, for example advertising, informational and entertainment programs. Each media reproduction unit is provided with a unique identifier which can be stored in a stored in a memory such as a ROM. | 2012-02-23 |
20120047547 | MANAGING UPSTREAM BANDWIDTH - A computer-implemented method for managing upstream bandwidth of a network including changing QoS settings, by a router, of a video device of a plurality of video devices in the network to a higher priority than other of the plurality of video devices. The plurality of video devices concurrently transmit video data. The computer-implemented method further includes estimating an overall upstream bandwidth by the higher priority video device and determining operating rates, by the router, for the plurality of video devices, such that said modem buffer is not backlogged. | 2012-02-23 |
20120047548 | NETWORK STORAGE SYSTEM WITH DATA PREFETCH AND METHOD OF OPERATION THEREOF - A method of operation of a network storage system includes: receiving a host command for displaying a video stream; performing a forced read ahead of the video stream beyond the host command including: identifying a high definition video stream, dynamically setting a block count and a loop count for the forced read ahead, and transferring data from hard disk drives to a cache for anticipating a host next command; and transferring cached data from the cache for responding to the host next command for displaying the video stream. | 2012-02-23 |
20120047549 | SYSTEM FOR ESTABLISHING COMMUNICATIONS WITH A MOBILE DEVICE SERVER - A system that incorporates teachings of the present disclosure may include, for example, a computer-readable storage medium operating in a mobile device server having computer instructions to execute a web server application in the mobile device server. The web server application can be operable to cause a media processor to invoke a software application in the mobile device server. The mobile device server can support voice communications over a cellular communication system. Other embodiments are disclosed. | 2012-02-23 |
20120047550 | Method and System for Device Integrity Authentication - A networked device performs integrity authentication by determining, using a processor, a measured integrity value of the device. The measured integrity value is compared by the processor to an embedded integrity value of the device. Application of a policy to the device is facilitated by the processor based on the comparison. | 2012-02-23 |
20120047551 | Machine-To-Machine Gateway Architecture - Systems, methods, and instrumentalities are disclosed that provide for a gateway outside of a network domain to provide services to a plurality of devices. For example, the gateway may act as a management entity or as a proxy for the network domain. As a management entity, the gateway may perform a security function relating to each of the plurality of devices. The gateway may perform the security function without the network domain participating or having knowledge of the particular devices. As a proxy for the network, the gateway may receive a command from the network domain to perform a security function relating to each of a plurality of devices. The network may know the identity of each of the plurality of devices. The gateway may perform the security function for each of the plurality of devices and aggregate related information before sending the information to the network domain. | 2012-02-23 |
20120047552 | DYNAMICALLY UPDATED SECURE HANDLING OF DOCUMENTS CONTAINING RESTRICTED INFORMATION - A method, system and computer program product for processing documents containing restricted information. One aspect concerns updating the relevant information security rules applicable to the documents. | 2012-02-23 |
20120047553 | SECURE DISTRIBUTED STORAGE OF DOCUMENTS CONTAINING RESTRICTED INFORMATION, VIA THE USE OF KEYSETS - A method, system and computer program product for processing documents containing restricted information. One aspect concerns storing documents in a distributed but secure manner, for example using keysets. | 2012-02-23 |
20120047554 | WEB SERVICE PROVISION SYSTEM, SERVER DEVICE, AND METHOD - A web application server includes a user information management unit that manages user IDs and attributes such that each of the user IDs is associated with corresponding one of the attributes, a security policy management unit that manages security policies such that each of security policies is associated with corresponding one of the attributes, a security policy acquisition unit that acquires one of the security policies based on one of the attributes associated with one of the user IDs, and an HTML file generation unit that generates an HTML file in which a script to acquire personal data of corresponding one of users from an intra-company database server is embedded based on one of the security policies of the corresponding one of the users. | 2012-02-23 |
20120047555 | PLATFORM AUTHENTICATION METHOD SUITABLE FOR TRUSTED NETWORK CONNECT ARCHITECTURE BASED ON TRI-ELEMENT PEER AUTHENTICATION - The invention discloses a platform authentication method suitable for trusted network connect (TNC) architecture based on tri-element peer authentication (TePA). The method relates to a platform authentication protocol of tri-element peer authentication, and the protocol improves network security as compared with prior platform authentication protocols; in the platform authentication protocol of the TNC architecture based on TePA, a policy manager plays a role as a trusted third party, which is convenient for concentrated management, thus enhancing manageability; the invention relates to the platform authentication protocol of the TNC architecture based on TePA, has different implementation methods and is beneficial for different dispositions and realizations. | 2012-02-23 |
20120047556 | ON-LINE CENTRALIZATION AND LOCAL AUTHORIZATION OF EXECUTABLE FILES - A system and system for controlling the execution of executable files. The executables are identified by either a cryptographic digest or a digital certificate. The cryptographic digest is computed from the binary image of the executable. An executable that is attempting to execute is intercepted by a protection module that consults a database of stored rules over a secure channel to determine whether or not the executable can be identified as a permitted executable and whether or not it has permission to execute on a particular computer system under certain specified conditions. If a stored permission is available, it is used to control the execution. Otherwise, the user is consulted for permission. | 2012-02-23 |
20120047557 | Method and System for Device Integrity Authentication - Device integrity authentication is performed by receiving, at a second device, a measured integrity value from a first device. The measured integrity value of the first device is compared at the second device to an embedded integrity value associated with the second device. A level of trust for the first device is determined by the second device based on the comparison. Application of a policy to the first device is facilitated by the second device based on the comparison. | 2012-02-23 |
20120047558 | Method And Apparatus Of Automated Discovery In A Communication Network - An automated method is provided for mutual discovery between a network entity and a client entity that cooperate for providing a service in a machine-to-machine environment. In an embodiment, the network entity receives an identifier in a communication from a server on behalf of the client entity. At some point in time, the network entity receives a communication containing the identifier from the client entity. Before or after receiving the client entity communication, the network entity discovers itself to the client entity. Some time after receiving the client entity communication, the network entity authenticates the client entity, establishes a permanent security association with the client entity, and initiates the service. | 2012-02-23 |
20120047559 | LICENSE INFORMATION EXCHANGE SYSTEM - When license information is transferred between a server machine and a client machine, an identifier which is unique to a series of communication sequences is provided. The identifier is sent when a communication is performed between the two machines, as well as when the license information is updated. Therefore, when a message for transferring the license information is received by the use of the same identifier, a response message is returned without updating the license information. | 2012-02-23 |
20120047560 | Social Age Verification Engine - A social networking system obtains parental authorization from a parent for a child to access a computing resource, where the parent and the child are users of the social networking system. The child user may request the authorization by identifying a purported parent user. The social networking system attempts to verify the validity of the purported parent user's account, the age of the user associated with the purported parent's account, and/or the existence of a parent-child relationship between users of the accounts associated with the purported parent and the child. The social networking system makes these determinations, at least in part, using social and transactional information associated with the purported parent user's account and the child user's account in the social networking system. Upon verification of these items, the social networking system may allow the purported parent to provide authorization responsive to the child's request to access the computing resource. | 2012-02-23 |
20120047561 | SECURING RESOURCE STORES WITH CLAIMS-BASED SECURITY - Methods, systems, and computer program products are provided for securing resource stores with claims-based security. From policy information, a resource store populates a security table of permissions. The permissions authorize resource access based on received claims. Sessions submit claims to the resource store. The resource store accumulates claims for a session into a claims list. From the claims list and the security table, the resource store filters out a subset of metadata including resource IDs for resources the session is authorized to access. Since the metadata corresponds to the session, any application using the session is given similar access to resources at the resource store. | 2012-02-23 |
20120047562 | SOFTWARE APPLICATIONS DISTRIBUTION METHOD AND APPARATUS - The present invention provides for a method and apparatus for distributing digital information, such as software applications, to application users. By providing the digital information on unused memory space of a computer system, and providing a process for authorizing access to the information, the information can be efficiently and cost effectively transferred to users. Traditional inventory and distribution channel difficulties are avoided. | 2012-02-23 |
20120047563 | AUTHENTICATION - An arrangement for authenticating a transaction between a user's mobile device and an entity such as a corporate server is disclosed. The user's universal integrated circuit card (UICC) is adapted to generate a time-dependent authentication code which is dependent on a time value and which is usable to authenticate the transaction only during a predetermined period. A time verification processor verifies a time value to ensure that the time-dependent authentication code was generated based on the correct time value. The time value is based on the UTC time obtained from UTC clock. The verified time is used to generate a “one-time” password (authentication code) by the authentication code calculator of the UICC. This is used to authenticate a transaction with the corporate network. | 2012-02-23 |
20120047564 | SECURITY SYSTEM AND METHOD - A method of operating a security system includes accessing a database and obtaining a user PIN. A normal keypad is defined in which a plurality of alphanumeric characters are displayed in defined normal positions. A scrambled keypad is also defined including the PIN so that at least some of a plurality of alphanumeric characters are displayed on the scrambled keypad in positions which are different to the positions in which they would be displayed in the defined normal keypad. In addition, for each of the alphanumeric characters of the PIN the alphanumeric character which is normally displayed in the normal keypad in the position in which the alphanumeric characters of the PIN are displayed in the scrambled keypad is determined thereby to arrive at a scrambled PIN Data defining the scrambled keypad is then transmitted to a user over a first communications network. | 2012-02-23 |
20120047565 | PROXIMITY-BASED SOCIAL GRAPH CREATION - Systems and methods are disclosed for creating social connections. In general, a current crowd of a first user is monitored to detect if the current crowd matches an active interest of the first user. If the current crowd matches the active interest, a beacon is narrowcast to mobile devices of at least a subset of a number of other users in the current crowd of the first user. In one embodiment, the beacon is narrowcast to mobile devices of all of the other users in the current crowd. In another embodiment, the beacon is narrowcast to the mobile devices of only those other users having user profiles that include interests that match the active interest of the first user. Subsequently, a response to the beacon is received from a mobile device of a second user, and a new social connection is created between the first and second users. | 2012-02-23 |
20120047566 | PASSWORD PROTECTED SECURE DEVICE - The invention relates to a password protected secure device associated to a password. The secure device is in a state chosen from a group of states comprising an unlocked state, a first locked state and a second locked state. The state changes from said first locked state to said unlocked state if a user input which matches said password is received, and the state changes from said first locked state to said second locked state if a predetermined number of user inputs which do not match said password are received. The password protected secure device comprises a receiver for receiving biometric sample data, a memory comprising biometric template data, and a processor configured to compare said biometric sample data with said biometric template data. A match between the biometric sample data and the biometric template data causes said secure device to provide information for changing the password protected device from a first state to a second state, wherein one of the first state and the second state is the second locked state. | 2012-02-23 |
20120047567 | IMAGE FORMING APPARATUS, CONTROLLING METHOD AND PROGRAM - There is provided a system in which, even if cache data of a user is not held in a multifunction machine, the relevant user can log in to the multifunction machine in a case where the relevant user is approved by a user of which the cache data has been held in the multifunction machine. | 2012-02-23 |
20120047568 | Digital Asset Management on the Internet - Techniques pertaining to managing digital assets and data stored in various third-party web services on the Internet are disclosed. A web platform based on web standards is constructed. A web driver containing specifications of a plurality of digital asset management feature plug-ins is provided. A third-party web service on the Internet implements the web driver by adding programming codes according to the specifications and returns the implemented web driver. The web platform registers the third-party web service by storing the web driver in a database. Any registered web services can be added to the web platform as virtual storage devices, or Smart Drives, by a user. Digital assets and data stored in various registered third-party web services can be directly managed or ported from one to the others through accessing corresponding Smart Drives without having to go through multiple logins. | 2012-02-23 |
20120047569 | METHOD FOR PROVIDING TERMINALS OF IMS NETWORK WITH FIREWALL AND FIREWALL SYSTEM - A method for providing firewall for terminals in the IMS network and a firewall system are provided. The method includes: arranging a firewall system in the IMS network; acquiring an identification information of said terminal, when the firewall system receives a request for providing the terminal with a firewall from a network element; sending an identification information of the firewall system to the terminal and related network elements; and managing at least part of the communication activities between said terminal and other network elements by the firewall system, wherein, said other network elements include network elements in the IMS network and/or network elements which communicate with said terminal via the IMS network. | 2012-02-23 |
20120047570 | FIREWALLS FOR SECURING CUSTOMER DATA IN A MULTI-TENANT ENVIRONMENT - Network security is enhanced in a multi-tenant database network environment using a query plan detection module to continually poll the database system to locate and raise an alert for suspect query plans. Security also can be enhanced using a firewall system sitting between the application servers and the client systems that records user and organization information for each client request received, compares this with information included in a response from an application server, and verifies that the response is being sent to the appropriate user. Security also can be enhanced using a client-side firewall system with logic executing on the client system that verifies whether a response from an application server is being sent to the appropriate user system by comparing user and organization id information stored at the client with similar information in the response. | 2012-02-23 |
20120047571 | SYSTEMS AND METHODS FOR DETECTING PRESELECTED QUERY TYPE WITHIN A DNS QUERY - In some embodiments, a non-transitory processor-readable medium storing code representing instructions to cause a processor to perform a process includes code to determine whether an IPv4 packet is associated with a Domain Name System (DNS) query based on an IPv4 header of the IPv4 packet. If the IPv4 packet is a DNS query packet, the non-transitory processor-readable medium includes code to determine whether the IPv4 packet has a preselected query type based on a payload of the IPv4 packet. If the IPv4 packet is a DNS query packet and has the preselected query type, the non-transitory processor-readable medium includes code to send a signal to block transmission of the IPv4 packet. In some embodiments, the preselected query type has a DNS record type value of 28. | 2012-02-23 |
20120047572 | DECAPSULATION OF DATA PACKET TUNNELS TO PROCESS ENCAPSULATED IPV4 OR IPV6 PACKETS - In one embodiment, a non-transitory processor-readable medium stores code representing instructions to cause a processor to determine whether an IPv4 payload of an IPv4 packet includes a tunneled IPv6 packet. When the IPv4 payload includes the tunneled IPv6 packet, the code can determine a location of a payload of the tunneled IPv6 packet based at least in part on a header of the tunneled IPv6 packet, and send a signal to block transmission of the IPv4 packet when the payload of the tunneled IPv6 packet is not a valid IPv6 payload. | 2012-02-23 |
20120047573 | METHODS AND APPARATUS FOR DETECTING INVALID IPV6 PACKETS - In one embodiment, a non-transitory processor-readable medium stores code representing instructions to cause a processor to determine (1) whether an IPv6 packet includes an extension header of an illegal type and (2) a quantity of extension headers present in the IPv6 packet that are of a preselected type. When the IPv6 packet includes the extension header of the illegal type, the code can send a first signal to block transmission of the IPv6 packet. When the quantity of extension headers that are of the preselected type is greater than a preselected quantity, the code can send a second signal to block transmission of the IPv6 packet. | 2012-02-23 |
20120047574 | TERMINAL AND METHOD FOR RECOGNIZING MULTI USER INPUT - A terminal includes an input unit to receive input signals of users, a human information detection unit to detect user human information of the users, a user identification unit to identify the users using the user human information, and a control unit to identify the users corresponding to the input signals, and to control the terminal according to the input signals of the identified users. A method for controlling a terminal includes receiving input signals of users, detecting user human information, identifying the user using the user human information, identifying the users corresponding to the received input signals, and controlling the terminal according to the input signals of the identified users. | 2012-02-23 |
20120047575 | SYSTEMS AND METHODS FOR PERFORMING ACCESS ENTITLEMENT REVIEWS - Embodiments of the invention relate to risk assessments and, more particularly to performing access risk assessments based on identified outliers. | 2012-02-23 |
20120047576 | Hardware-Implemented Hypervisor for Root-of-Trust Monitoring and Control of Computer System - A system and method for modifying a processor system with hypervisor hardware to provide protection against malware. The processor system is assumed to be of a type having at least a CPU and a high-speed bus for providing data links between the CPU, other bus masters, and peripherals (including a debug interface unit). The hypervisor hardware elements are (1) a co-processor programmed to perform one or more security tasks; (2) a communications interface between the co-processor and the debug interface unit; (3) a behavioral interface on the high-speed bus, configured to monitor control signals from the CPU, and (4) an access controller on the high-speed bus, configured to store access control data, to intercept requests on the high-speed bus, to evaluate the requests against the access control data, and to grant or deny the requests. | 2012-02-23 |
20120047577 | SAFE URL SHORTENING - A safe URL shortening service creates a short URL from any valid long URL. At resolution time, the service determines if the resulting URL points to a known bad, known good, or unknown site. Depending on the determination results, the service may redirect a user to the target site, block redirection, or present a warning page that allows the user to manually activate the target link. | 2012-02-23 |
20120047578 | Method and System for Device Integrity Authentication - Device integrity authentication is performed by receiving, at a second device, data from a first device. A determination is made at the second device as to whether at least a portion of the data is associated with a protected datatype. A measured integrity value of the first device is determined in response to the portion of the data being associated with the protected datatype. The measured integrity value of the first device is compared to an embedded integrity value associated with the second device. Application of at least one of a plurality of policies associated with processing the data is facilitated at the second device based on the comparison and the protected datatype. | 2012-02-23 |
20120047579 | INFORMATION DEVICE, PROGRAM, METHOD FOR PREVENTING EXECUTION OF UNAUTHORIZED PROGRAM CODE, AND COMPUTER READABLE RECORDING MEDIUM - An unauthorized access relating to buffer overflow is prevented reliably and easily, without dependence on the function that a CPU processes. An information device ( | 2012-02-23 |
20120047580 | METHOD AND APPARATUS FOR ENFORCING A MANDATORY SECURITY POLICY ON AN OPERATING SYSTEM (OS) INDEPENDENT ANTI-VIRUS (AV) SCANNER - An antivirus (AV) application specifies a fault handler code image, a fault handler manifest, a memory location of the AV application, and an AV application manifest. A loader verifies the fault handler code image and the fault handler manifest, creates a first security domain having a first security level, copies the fault handler code image to memory associated with the first security domain, and initiates execution of the fault handler. The loader requests the locking of memory pages in the guest OS that are reserved for the AV application. The fault handler locks the executable code image of the AV application loaded into guest OS memory by setting traps on selected code segments in guest OS memory. | 2012-02-23 |
20120047581 | EVENT-DRIVEN AUTO-RESTORATION OF WEBSITES - An event-driven auto-restoration system for websites comprises a processing system. The processing system is configured to detect an event associated with a website indicative of a change in the website to an undesired state. The processing system is further configured to dynamically generate a restoration process and employ the restoration process to restore the website to a desired state. The processing system is further configured to employ a verification process to verify that the website has been restored to the desired state. | 2012-02-23 |
20120047582 | DATA DELETING METHOD FOR COMPUTER STORAGE DEVICE - A data deleting method for a computer storage device is implemented by first setting a default status of a delete-able status for a deletion record file in the storage device when the storage device is powered on, where the default status can be enable or disable. If the delete-able status of the deletion record file is kept in an enable state before the storage device is powered off, the whole data stored in the storage device is deleted automatically when the storage device is powered on next time. This is because the enable state of the delete-able status of the deletion record file is detected by a control unit of the storage device. Therefore, the method can prevent the data in the storage device from any theft or unauthorized usage. | 2012-02-23 |
20120047583 | CABLE FRAUD DETECTION SYSTEM - Embodiments of the present disclosure provide constant support against fraudulent cable devices maintaining unauthorized connectivity and utilizing data lines illegally within an entire network regardless of the number of DHCP servers. Embodiments maintain an updated database which is mined for duplicate MAC (Media Access Control) addresses and utilizes the assigned IPs to communicate with the devices via Simple Network Management Protocol (SNMP) comparing their system description Object Identifier (OID) value with the stored value located in the device Management Information (MI) database. When a fraudulent device is found, a series of events is triggered which discontinues service as well as bans the fraudulent device from reconnecting to the network. | 2012-02-23 |
20120047584 | USER REQUEST APPROVAL SYSTEM USING ADVERTISMENTS AND METHOD - A user request approval system includes access to an advertisement database, an advertisement verification generation module, a user interface module and a checking module. The advertisement database stores a plurality of advertisement. The advertisement verification generation module receives advertisement from the advertisement database and generates an advertisement verification based on the advertisement. The user interface module displays the advertisement verification on a user interface and receives an input user verification. The checking module determines if the input verification corresponds to the advertisement verification. | 2012-02-23 |
20120047585 | HCO32 AND HCO27 AND RELATED EXAMPLES - The instant invention relates to transgenic non-human animals capable of producing heterologous antibodies, transgenes used to produce such transgenic animals, transgenes capable of functionally rearranging a heterologous D gene in V-D-J recombination, immortalized B-cells capable of producing heterologous antibodies, methods and transgenes for producing heterologous antibodies of multiple isotypes, methods and transgenes for producing heterologous antibodies wherein a variable region sequence comprises somatic mutation as compared to germline rearranged variable region sequences, transgenic nonhuman animals which produce antibodies having a human primary sequence and which bind to human antigens, hybridomas made from B cells of such transgenic animals, and monoclonal antibodies expressed by such hybridomas. | 2012-02-23 |
20120047586 | POLYPEPTIDE HAVING ENHANCED EFFECTOR FUNCTION - Disclosed is a polypeptide having an enhanced effector function. Specifically disclosed are: a polypeptide having a modified Fc region; a nucleic acid encoding the polypeptide; a vector carrying the nucleic acid; a host cell or a host organism harboring the vector; a pharmaceutical composition comprising the polypeptide; a method for producing the polypeptide; a method for enhancing the effector function of an antibody; and a method for producing a cell capable of producing an antibody having a high effector function. | 2012-02-23 |
20120047587 | ESTROUS CYCLE MONITORING BY COLOR RESPONSE - A method of determining the phase of an estrous cycle that a mammal is in at a given time that a biological sample is obtained from the mammal is provided. The biological sample obtained from the mammal is combined with at least one flavonoid pigment that reacts with the biological sample on a hydrophobic surface to provide a color response. The estrus phase of the estrous cycle has a corresponding color response that is distinguishable from the color response of each other phase of the estrous cycle to an unaided human eye. The corresponding color response is correlated to the estrus phase of the estrous cycle. | 2012-02-23 |
20120047588 | Methods for Conditional and Inducible Transgene Expression to Direct the Development of Embryonic, Embryonic Stem, Precursor and Induced Pluripotent Stem Cells - Methods are disclosed in which the expression of a specific gene, or combinations of genes, is controlled spatially and temporally to develop intra- and interspecies chimeras. A transgenic EC/ES/P/iPS cell line is created which conditionally expresses a suicide or compromiser gene configured to compromise all cell lineages except that corresponding to a target tissue/organ. The EC/ES/P/iPS cell line is injected into donor embryos having a specific target gene deficiency or embryos genetically engineered to be complementary compromised in lineages corresponding to the target tissue/organ cell lineages of the EC/ES/P/iPS line. One or more stimuli is provided to the embryo to activate compromiser genes for ablation of non-target tissues/organs of the EC/ES/P/iPS line and target tissues/organs of the host embryo, resulting in a chimeric animal having target tissues/organs derived from the genotype of the transgenic cell line and all remaining tissues/organs derived from the donor embryo. | 2012-02-23 |
20120047589 | METHOD OF DELIVERY OF NUCLEIC ACIDS TO A DEVELOPING EMBRYO - Methods to introduce genetic material, such as DNA, to embryos, are disclosed. In some embodiments, the method involves preparing the pregnant mother to receive the genetic material into a blood transport vessel which passes to the embryo, avoiding a maternal capillary bed and introducing the material under low pressure so as not to kill the pregnant animal. The effectiveness of the method is such that the nucleic acid has been expressed in all the cells of the embryo and in the postnatal mouse, including the primordial germ cells, thus making the nucleic acid germ line heritable. | 2012-02-23 |
20120047590 | LETTUCE LINE RX17275496 - The invention provides seed and plants of the lettuce line designated RX17275496. The invention thus relates to the plants, seeds and tissue cultures of lettuce line RX17275496, and to methods for producing a lettuce plant produced by crossing a plant of lettuce line RX17275496 with itself or with another lettuce plant, such as a plant of another line. The invention further relates to seeds and plants produced by such crossing. The invention further relates to parts of a plant of lettuce line RX17275496, including the gametes of such plants. | 2012-02-23 |
20120047591 | SOYBEAN VARIETY A1024720 - The invention relates to the soybean variety designated A1024720. Provided by the invention are the seeds, plants and derivatives of the soybean variety A1024720. Also provided by the invention are tissue cultures of the soybean variety A1024720 and the plants regenerated therefrom. Still further provided by the invention are methods for producing soybean plants by crossing the soybean variety A1024720 with itself or another soybean variety and plants produced by such methods. | 2012-02-23 |
20120047592 | SOYBEAN VARIETY A1024747 - The invention relates to the soybean variety designated A1024747. Provided by the invention are the seeds, plants and derivatives of the soybean variety A1024747. Also provided by the invention are tissue cultures of the soybean variety A1024747 and the plants regenerated therefrom. Still further provided by the invention are methods for producing soybean plants by crossing the soybean variety A1024747 with itself or another soybean variety and plants produced by such methods. | 2012-02-23 |
20120047593 | SOYBEAN VARIETY A1024748 - The invention relates to the soybean variety designated A1024748. Provided by the invention are the seeds, plants and derivatives of the soybean variety A1024748. Also provided by the invention are tissue cultures of the soybean variety A1024748 and the plants regenerated therefrom. Still further provided by the invention are methods for producing soybean plants by crossing the soybean variety A1024748 with itself or another soybean variety and plants produced by such methods. | 2012-02-23 |
20120047594 | SOYBEAN VARIETY A1024749 - The invention relates to the soybean variety designated A1024749. Provided by the invention are the seeds, plants and derivatives of the soybean variety A1024749. Also provided by the invention are tissue cultures of the soybean variety A1024749 and the plants regenerated therefrom. Still further provided by the invention are methods for producing soybean plants by crossing the soybean variety A1024749 with itself or another soybean variety and plants produced by such methods. | 2012-02-23 |
20120047595 | SOYBEAN VARIETY A1024750 - The invention relates to the soybean variety designated A1024750. Provided by the invention are the seeds, plants and derivatives of the soybean variety A1024750. Also provided by the invention are tissue cultures of the soybean variety A1024750 and the plants regenerated therefrom. Still further provided by the invention are methods for producing soybean plants by crossing the soybean variety A1024750 with itself or another soybean variety and plants produced by such methods. | 2012-02-23 |
20120047596 | SOYBEAN VARIETY A1024751 - The invention relates to the soybean variety designated A1024751. Provided by the invention are the seeds, plants and derivatives of the soybean variety A1024751. Also provided by the invention are tissue cultures of the soybean variety A1024751 and the plants regenerated therefrom. Still further provided by the invention are methods for producing soybean plants by crossing the soybean variety A1024751 with itself or another soybean variety and plants produced by such methods. | 2012-02-23 |
20120047597 | SOYBEAN VARIETY A1015644 - The invention relates to the soybean variety designated A1015644. Provided by the invention are the seeds, plants and derivatives of the soybean variety A1015644. Also provided by the invention are tissue cultures of the soybean variety A1015644 and the plants regenerated therefrom. Still further provided by the invention are methods for producing soybean plants by crossing the soybean variety A1015644 with itself or another soybean variety and plants produced by such methods. | 2012-02-23 |
20120047598 | SOYBEAN VARIETY A1015881 - The invention relates to the soybean variety designated A1015881. Provided by the invention are the seeds, plants and derivatives of the soybean variety A1015881. Also provided by the invention are tissue cultures of the soybean variety A1015881 and the plants regenerated therefrom. Still further provided by the invention are methods for producing soybean plants by crossing the soybean variety A1015881 with itself or another soybean variety and plants produced by such methods. | 2012-02-23 |
20120047599 | Chives Cultivar Biggy - A chives cultivar, designated Biggy, is disclosed. The invention relates to the seeds of chives cultivar Biggy, to the plants of chives cultivar Biggy and to methods for producing a chives plant by crossing the cultivar Biggy with itself or another chives cultivar. The invention further relates to methods for producing a chives plant containing in its genetic material one or more transgenes and to the transgenic chives plants and plant parts produced by those methods. This invention also relates to chives cultivars or breeding cultivars and plant parts derived from chives cultivar Biggy, to methods for producing other chives cultivars, lines or plant parts derived from chives cultivar Biggy and to the chives plants, varieties, and their parts derived from the use of those methods. The invention further relates to hybrid chives seeds, plants, and plant parts produced by crossing cultivar Biggy with another chives cultivar. | 2012-02-23 |
20120047600 | CAFFEOYL COA REDUCTASE - The invention provides methods for increasing lignin content in plants by expression of a cinnamoyl CoA reductase 2 (CCR2) coding sequence in the plant. Also provided are methods for reducing lignin content in a plant by down-regulation of CCR2 expression in the plant. Nucleic acid molecules for modulation of CCR2 expression and transgenic plants the same are also provided. Plants described herein may be used, for example, as improved biofuel feedstock and as highly digestible forage crops. Methods for processing plant tissue and for producing biofuels by utilizing such plants are also provided. | 2012-02-23 |
20120047601 | Method of Reducing Acetylation in Plants to Improve Biofuel Production - The invention provides methods for engineering plants to have reduced levels of acetylation by decreasing expression of one or more Cas1L genes. Such plants can be used, e.g., to increase yield for biofuel production. | 2012-02-23 |
20120047602 | RNA-Mediated Induction of Gene Expression in Plants - The present invention is in the field of plant genetics and provides methods for increasing gene expression of a target gene in a plant or part thereof. In addition the invention relates to methods for modifying the specificity of plant specific promoters and for engineering small non-coding activating RNA (sncaRNA) in order to increase expression of a target gene in a plant or part thereof. The present invention also provides methods for the identification of sncaRNA, and its primary transcripts in a plant capable of increasing gene expression in a plant or part thereof. | 2012-02-23 |
20120047603 | DROUGHT TOLERANT PLANTS AND RELATED CONSTRUCTS AND METHODS INVOLVING GENES ENCODING FATTY ACID DESATURASE FAMILY POLYPEPTIDES - Isolated polynucleotides and polypeptides and recombinant DNA constructs useful for conferring drought tolerance, compositions (such as plants or seeds) comprising these recombinant DNA constructs, and methods utilizing these recombinant DNA constructs. The recombinant DNA construct comprises a polynucleotide operably linked to a promoter that is functional in a plant, wherein said polynucleotide encodes a Fatty Acid Desaturase Family (FADF) polypeptide. | 2012-02-23 |
20120047604 | NOVEL KINASE-START GENE CONFERRING RESISTANCE TO PLANT DISEASE AND TRANSGENIC PLANTS COMPRISING IT - An isolated nucleic acid molecule comprising a nucleotide sequence which encodes a polypeptide comprising both a steroidogenic acute regulatory protein-related lipid transfer (START) domain and a kinase domain is provided, as well as plant cells and transgenic plants comprising said nucleic acid molecule, said transgenic plants being resistant to plant disease. | 2012-02-23 |
20120047605 | Novel Bacillus thuringiensis Gene with Lepidopteran Activity - The invention provides nucleic acids, and variants and fragments thereof, obtained from strains of | 2012-02-23 |
20120047606 | Novel Bacillus thuringiensis Gene with Lepidopteran Activity - The invention provides nucleic acids, and variants and fragments thereof, obtained from strains of | 2012-02-23 |
20120047607 | Novel Bacillus thuringiensis Gene with Coleopteran Activity - The invention provides nucleic acids, and variants and fragments thereof, obtained from strains of | 2012-02-23 |
20120047608 | Floral Transition Genes in Maize and Uses Thereof - The invention provides isolated floral transition nucleic acids and their encoded proteins. The present invention provides methods and compositions relating to altering floral transition in plants. The invention further provides regulatory elements, recombinant expression cassettes, host cells and transgenic plants. | 2012-02-23 |
20120047609 | PLANT ARTIFICIAL CHROMOSOME PLATFORMS VIA TELOMERE TRUNCATION - The invention provides engineered plant minichromosomes generated by telomere mediated truncation of native chromosomes. These minichromosomes are faithfully transmitted from one generation to the next and provide an ideal platform for breeding genes into desired plant varieties with out problems, such as linkage drag, associated with standard breeding methods. | 2012-02-23 |
20120047610 | CANTILEVER-BASED OPTICAL INTERFACE FORCE MICROSCOPE - A method and an apparatus for detecting a normal force component and a friction force component between a probe and a sample substance using an interfacial force microscope is disclosed herein. According to one embodiment, a method of measuring normal and friction forces with an interfacial force microscope includes positioning a sample substance on a piezotube and in proximity to a probe suspended from a cantilever such that a molecular force between the sample substance and the probe causes the cantilever to deflect. The method may include converting the deflection of the cantilever into an electrical signal comprising a normal force and a friction force component, and measuring the normal and friction force components. | 2012-02-23 |
20120047611 | HYDRANGEA PLANT NAMED 'GALILEE' - A new and distinct cultivar of | 2012-02-23 |
20120047612 | Eucomis plant named 'Freckles' - A new and distinct | 2012-02-23 |
20120047613 | SALVIA PLANT NAMED 'ORCHID GLOW' - A new and distinct | 2012-02-23 |
20120044648 | FIXING MECHANISM FOR FIXING A THERMAL MODULE ON A BASE AND RELATED ELECTRONIC DEVICE - A fixing mechanism for fixing a thermal module on a base includes a U-shaped buckling component disposed on a side of the base for buckling a thermal fin and a heat conducting block of the thermal module, and a fixing component disposed on the other side of the base and connected to the U-shaped buckling component for clipping the base with the U-shaped buckling component. | 2012-02-23 |
20120045529 | COMPOSITIONS COMPRISING PAULOWNIA TOMENTOSA WOOD EXTRACTS AND USES THEREOF - Provided are compositions comprising an extract of | 2012-02-23 |
20120046528 | SYSTEM AND METHOD FOR DETECTING AND TREATING CARDIOVASCULAR DISEASE - A system for detecting and treating congestive heart failure includes an implantable module, such as a pacemaker, and a patient advisory module. The system is configured to measure thoracic impedance and to provide the patient with instructions in order to improve the accuracy of the thoracic impedance measurement as well as treating symptoms of congestive heart failure. | 2012-02-23 |
20120046973 | Unemployment Insurance Marketing System - Embodiments of the invention include systems, methods, and computer-program products that provide for a unique unemployment insurance marketing system. In one embodiment of the invention, the unemployment insurance marketing system determines selection criteria for the unemployment insurance product. The system then receives data associated with a user, the data received from a financial institution. The system compares the selection criteria with the user data to determine whether the user qualifies to receive an offer. If the user qualifies to receive an offer, the system offers the unemployment insurance to the user. In another embodiment of the invention, the offer is customized to the user's expenses. For example, the offer may be customized based on user's expenses in an online bill payment system. | 2012-02-23 |