13th week of 2012 patent applcation highlights part 66 |
Patent application number | Title | Published |
20120079534 | SET-TOP BOX AND METHOD FOR SEARCHING TEXT IN VIDEO PROGRAMS - A set-top box captures a video frame of a video program of a television, and analyzes the video frame to retrieve text in the video frame. The set-top box further searches information regarding the text on the Internet, and transmits the information regarding the text to the television for display. | 2012-03-29 |
20120079535 | SOCIAL TELEVISION SERVICE - A a method, a receiver, a computer program and a system for providing an interactive service in association with a motion picture service. The motion picture is displayed to the spectator via a receiver able to modify the motion picture displayed to the spectator and having a bi-directional network connection. The method, receiver, computer program and system are characterized in that a connection is formed that connects a plurality of participants to an interactive motion picture session, a selection of a target area in the motion picture is received, a selection of a graphical element to be associated with the target area is received, the target area is translated to a coordinate system shared by each participant in the interactive motion picture session and the graphical element is provided between the participants. | 2012-03-29 |
20120079536 | PARALLEL TELEVISION BASED MEDIA INTERACTION - A control device for interacting with a television system that displays media information. The control device is adapted to cause a change in an audio and/or a video portion of the media information on receiving an input from a user. The control device may further, for example, be adapted to govern actions of elements selected from the media information. At least one module is adapted to receive a movement selection from the user. The at least one module may also be adapted to send a control signal directing application of a movement corresponding to the movement selection to an element from the media information. The at least one module may further be adapted to display supplemental media information that guides the user to enter the movement selection. The control device may, for example, be adapted to interact with the Internet, which may provide audiovisual streams to the television system. | 2012-03-29 |
20120079537 | CREATING AND USING A VIRTUAL VIDEO ASSET IN A VIDEO PROVISIONING SYSTEM - A system may receive, from a content provider, metadata associated with a video asset, where the metadata includes information associated with the video asset and identifies a future time when the video asset will be available for distribution. The system may further process the metadata to create a virtual asset associated with the video asset, where the processed metadata include at least an indication that the metadata is associated with the virtual asset; publish the virtual asset to a store front that allows the user device to select the virtual asset to obtain the virtual asset; and transmit a notification or the video asset, to the user device and at the future time, based on the selection of the virtual asset by the user device, where the notification indicates that the video asset is available to be downloaded. | 2012-03-29 |
20120079538 | Systems and Methods for Filtering Access to Content During Selected Time Periods - Provided herein are techniques for controlling access to content during specified time periods. A time period and content filtering parameter specify access to controlled access to content. An entertainment device is configured to disallow access to content outside of the time period and allow access to the content within the time period. | 2012-03-29 |
20120079539 | INTERACTIVE COMPUTER SYSTEM FOR PROVIDING TELEVISION SCHEDULE INFORMATION - The present invention provides systems and methods for providing television schedule and/or listing information to a viewer, and for allowing the viewer to link, search, select and interact with information in a remote database, e.g., a database on the internet. The television schedule and/or listing information can be displayed on a variety of viewer interfaces, such as televisions screens, computer monitors, PCTV screens and the like. The television schedule and/or listing information may be stored on the viewer's computer, television, PCTV, or a remote server (e.g., a website), or the television schedule and/or listing information may be downloaded from a remote database to the viewer's computer, television or PCTV. | 2012-03-29 |
20120079540 | Secure Module And A Method For Providing A Dedicated On-Site Media Service - A service module for a dedicated on-site media service. The service module enables a dedicated media service for a broadcast signal. The electronic media module includes a tuner, a media storage device, and an adapter. The tuner, which is coupled to the media storage device, or portion thereof, is tuned to receive a broadcast signal. The media storage device stores this broadcast signal. The adapter is coupled to the media storage device and to the tuner. The adapter further interfaces the tuner and the media storage device of the electronic media module with an electronic media system. A content provider has remote control over the stored content. The content provider also has remote control over on-site presentation of the stored media to the viewer. Multiple dedicated service modules installed on-site allow these functions to be applied across multiple content-providers simultaneously. | 2012-03-29 |
20120079541 | One-Actuation Control of Synchronization of a Television System Terminal and a Mobile Device Display - A method for controlling of synchronization of a digital television terminal and a display of a mobile device is disclosed. In accordance with one embodiment, a dedicated input structure of the mobile device is used. When a video program is streamed by the mobile device, a single actuation by the user on the input structure triggers the terminal of the television to stream the same program in a synchronized manner. Similarly, when a video program is streamed by the television, a single actuation from the user leads to the mobile device to stream the same program in a synchronized manner. | 2012-03-29 |
20120079542 | PORTABLE RECORDED TELEVISION VIEWER - An approach to recording of television programming for later viewing makes use of a small and relatively inexpensive handheld portable viewer. One or more television programs are loaded into the viewer from a receiver, such as a cable television set-top box. Later, the user selects a loaded program for viewing on the handheld viewer | 2012-03-29 |
20120079543 | METHODS FOR REPLICATING MEDIA CONTENTS AND P2P VOD SYSTEMS - There is disclosed a method for replicating media contents in a P2P VoD system comprising a plurality of peers. The method may comprise: determining that a candidate media unit shall be replicated into a local storage of one of the peers; checking whether said local storage has enough space to store the candidate media unit; if not, selecting one media unit previously stored in said local storage to be replaced; and replacing the selected media unit by the candidate media unit. | 2012-03-29 |
20120079544 | Systems and Methods Utilizing Efficient Video Compression Techniques for Providing Static Image Data - Embodiments include systems, methods and computer program products that use video compression techniques to recompress image data that has been compressed using static image compression. In non-limiting examples, this can include using modern video compression techniques when browsing web pages referencing compressed static image data to obtain increased efficiency in transmission and/or rendering of the static image data on a browser at a client device. In an embodiment, a method includes receiving a request for image content, determining that the requested image content has been compressed using a static image compression as indicated by a static image compression signature. The requested image content is then transcoded to obtain compressed video content of the image content, wherein the image content is compressed using video compression as indicated by a video compression data signature. Responsive to the request, sending the compressed video content over the network to the second computing device. | 2012-03-29 |
20120079545 | EFFICIENT BANDWIDTH UTILIZATION - A method including providing content to one or more customer premises equipment (CPEs); receiving a content request for content from a requesting CPE; determining whether the content is already being delivered to at least one of the one or more CPEs; selecting a primary CPE to satisfy the content request when it is determined that the content is already being delivered to the at least one of the one or more CPEs; providing a network address of the primary CPE to the requesting CPE; and providing the content from the primary CPE to the requesting CPE. | 2012-03-29 |
20120079546 | CATALOG SLICING IN A VIDEO PROVISIONING SYSTEM - A system, associated with a video provisioning system, may receive a hierarchical representation of categories and subcategories associated with a catalog of video assets; and condense the hierarchical representation of categories and subcategories into a file. The system may further transmit the file to a set top box, where transmitting the file allows the set top box to access the hierarchical representation of categories and subcategories without retrieving, from the video provisioning system, additional information associated with the hierarchical representation of categories and subcategories. | 2012-03-29 |
20120079547 | Multimedia Network Interface Device with Table-Based Connection Management - A set-top box or other network interface device incorporates functionality for distributing multimedia signals to multiple televisions or other terminal devices within a residence or other facility. In one aspect, the network interface device comprises a processor, a memory coupled to the processor, first network interface circuitry for receiving multimedia signals from an access network, and second network interface circuitry for communicating over a local network with a plurality of terminal devices. The network interface device is operative under control of the processor to deliver selected ones of the multimedia signals to the terminal devices responsive to control commands received from the terminal devices. The memory of the network interface device stores a connection management table indicating for each of the terminal devices at least a selected one of the multimedia signals and status information for that terminal device. | 2012-03-29 |
20120079548 | MANAGEMENT AND UTILIZATION OF RECORDED VIDEO CONTENT - Management of and utilization of information related to recorded video content are provided. For any given piece of recorded content, identification information for any of a number of interested persons may be associated with the recorded content. After each interested person associated with a given piece of recorded content views or watches the content or decides he or she is not interested in the recorded content, the recorded content may be deleted. A graphical user interface may be provided for showing the viewing status of persons associated with a given piece of recorded content and for allowing each person associated with the recorded content to manage their individual viewing status. Information about content viewed by identified persons may be used to direct advertising or suggested content to one or more identified persons. | 2012-03-29 |
20120079549 | METHODS, APPARATUSES AND COMPUTER PROGRAM PRODUCTS FOR MEDIA RECORDING - It is presented a media caching apparatus for caching media content for a plurality of remotely located recording devices, where each remotely located recording device is connectable to the media caching apparatus via a respective local access line. The media caching apparatus comprises: a controller for receiving cache commands to temporarily store a specified media content; a memory for temporarily storing media content and to store an association between the specified media content and the specified recording device; a content receiving interface for receiving the specified media content and store the media content in the memory; and a content transmitting interface for sending the specified media content to the specified recording device via the local access line coupled to the specified recording device, wherein the content transmitting interface prevents affecting delivery of higher priority content on the local access line coupled to the specified recording device. | 2012-03-29 |
20120079550 | BROADCAST TRANSMITTER, BROADCAST RECEIVER, AND BROADCAST TRANSMISSION METHOD - According to one embodiment, a broadcast transmitter includes a generator and a transmitter. The generator generates service information including event information table information that describes format information indicating the format of distribution content corresponding to broadcast content distributed via a communication network. The transmitter multiplexes the service information into a transport stream and transmits the transport stream. | 2012-03-29 |
20120079551 | INFORMATION OUTPUT APPARATUS, INFORMATION PROCESSING SYSTEM AND INFORMATION PROCESSING METHOD - An information output apparatus has a first interface to receive an equipment operational signal from a short-range wireless communication apparatus, a second interface to receive broadcast wave data based on the equipment operational signal, a third interface to transmit the equipment operational signal to an information generating apparatus, a fourth interface to receive video data transmitted from the information generating apparatus, a fifth interface to receive a control command transmitted from the information generating apparatus in response to the equipment operational signal transmitted from the third interface part, an information superimposing part to transmit the equipment operational signal from the third interface part to the information generating apparatus and then to superimpose video data updated by the information generating apparatus and received from the fourth interface part with the broadcast wave data to display the superimposed data on a display part. | 2012-03-29 |
20120079552 | DIGITAL TELEVISION TRANSMITTING SYSTEM AND RECEIVING SYSTEM AND METHOD OF PROCESSING BROADCAST DATA - A digital television receiving system includes a first known data detector, a second known data detector, and a selector. The first known data detector detects a location of a first known data sequence in a broadcast signal by calculating a first correlation value between the broadcast signal and a first reference known data sequence. Similarly, the second known data detector detects a location of a second known data sequence in the broadcast signal by calculating a second correlation value between the broadcast signal and a second reference known data sequence. The selector selects the location information detected by one of the first and second known data detectors with a greater correlation value. | 2012-03-29 |
20120079553 | Methods and Arrangements in a Telecommunication Network - The present invention relates to methods and arrangements for automatically providing presence status information regarding the line state in the IMS. This is achieved by a client based solution. The client ( | 2012-03-29 |
20120079554 | High Definition Television Signal Compatibility Verification - A system for providing television (TV) service including high definition television (HDTV) service, and for providing verification that a subscriber has connected an HDTV to the system includes a TV service provider headend and a set top box (STB). The HDTV may have an HDTV digital video interface (DVI) interconnect. The STB may be electrically coupled to the headend and have an STB DVI interconnect. When the HDTV DVI interconnect is initially electrically coupled to the STB DVI interconnect, the HDTV generally presents a data signal to the STB and the STB generally presents the data signal to the headend. | 2012-03-29 |
20120079555 | SYSTEM FOR SCREEN DANCE STUDIO - A system for an exercise screen dance studio includes an image storage unit, an audio unit, a controller, a large mirror, a projector, a screen image unit, and a left-right image reversal unit for reversing left-right sides of an image. In addition, a screen image unit is provided either behind a trainee dancer with a large mirror being provided in front of the trainee or the screen image unit can be integrated with the large mirror. A large screen image unit and a projector for proving audio and image may be provided, wherein the large mirror is arranged in front of the trainee and the screen image unit is placed on a rear side thereof or inside the mirror so that the trainee can see simultaneously his/her reflected exercising image and the projected dance exercising image through the mirror in the same orientation with regard to left-right sides or as a reversed image. | 2012-03-29 |
20120079556 | SEPARATION OF DUTIES CHECKS FROM ENTITLEMENT SETS - A data model in which a set provides an abstraction that isolates the computation of membership from the details of how an enforcement point determines access (e.g., based on claims, based on security group membership etc). Set operations (e.g., intersection, union, inverse) can then be used across the sets. The architecture utilizes workflow on set transitions such that when an object such as a user enters the scope of one of these sets, notification can occur, such that inadvertent changes which lead to separation-of-duties violations can be detected quickly. The sets can also be used to define entitlements for enforcement of claims-based access control in a cross-organization deployment (e.g., to a cloud-hosted application). | 2012-03-29 |
20120079557 | DERIVING EXPRESS RIGHTS IN PROTECTED CONTENT - The present invention extends to methods, systems, and computer program products for deriving express rights in protected content. Embodiments of the invention provide mechanisms to convert implicit rights to express rights for entities, including applications, inside and outside of an organizational (e.g., enterprise) boundary. The conversion can occur dynamically, based on the information protection policies defined by a policy administrator, granting entities express access to perform tasks on protected content. | 2012-03-29 |
20120079558 | Safety and securely us personal computer working at home or anywhere instead of going and working in the office - Revolutionary safely and securely using computers work at home or on the road is invented. The architecture of Corpnetlk7 built for the platform includes components, utility programs and files majority residing on the host company's servers. They work together with local and corporate machines where configurations are made and certain programs are installed. The user will go through different steps before reaching to the corporate legacy system. Corpnetlk7 consists of Corpnetlk7 Client, Server and Corporate Side Configuration Utility, Corpnetlk7 Connection Agent, Corpnetlk7 Names Server Manager, Corpnetlk7 Enterprise App, Corpnetlk7 User App, Corpnetlk7 Security Enhancement Layers, Corpnetlk7 Programs Repository, Corpnetlk7 Programs Security Storage Lockroom, Corpnetlk7 Multithreaded Server, Corpnetlk7 Host GUI Interface and Corpnetlk7 New User Checksum etc. The user creates connectivity on the local machine and Corpnetlk7 helps the user resolve the names service. | 2012-03-29 |
20120079559 | METHODS FOR POLICY MANAGEMENT - Systems, methods, and apparatus are disclosed for coordinating enforcement of policies on a network and/or a wireless transmit/receive unit. The policies may include stakeholder-specific policies of one or more stakeholders that provide services on a user equipment. Enforcement of the stakeholder-specific policies may be securely coordinated using a policy coordination function. Systems, methods, and apparatus are also disclosed that include a network policy coordination function (NPCF) that coordinates service control policies and access control policies. The NPCF may coordinate enforcement of the service control policies for one or more service control entities and the access control policies for one or more access control entities. | 2012-03-29 |
20120079560 | METHOD, SYSTEM, AND COMPUTER PROGRAM PRODUCT FOR FACILITATING COMMUNICATION IN AN INTEROPERABILITY NETWORK - Methods and apparatus are described for facilitating communication among a plurality of entities via an interoperability network. Each entity has policy data corresponding thereto governing interaction with the entity via the interoperability network. A message is transmitted from a first one of the entities to a second one of the entities. The first entity has first policy data corresponding thereto and the second entity has second policy data corresponding thereto. The transmitted message was handled in the network according to combined policy data representing a combination of the first and second policy data. | 2012-03-29 |
20120079561 | ACCESS CONTROL METHOD FOR TRI-ELEMENT PEER AUTHENTICATION CREDIBLE NETWORK CONNECTION STRUCTURE - An access control method for a TePA-based TNC architecture is provided, including: 1) performing encapsulation of user authentication protocol data and platform authentication protocol data in the TePA-based TNC architecture: 1.1) encapsulating the user authentication protocol data in a Data field of TAEP packets, and interacting with the TAEP packets between an access requestor and an access controller, and between the access controller and a policy manager, to perform mutual user authentication between the access requestor and the access controller, and establish a secure channel between the access requestor and the access controller; and 1.2) encapsulating the platform authentication protocol data in a Data field of TAEP packets, and, for platform authentication protocol data between the access requestor and the access controller, encapsulating a TAEP packet of the platform authentication protocol data in a Data field of another TAEP packet to form a nested encapsulation. | 2012-03-29 |
20120079562 | METHOD AND APPARATUS FOR VALIDATING RESOURCE IDENTIFIER - An approach is provided for requesting access to content associated with a resource identifier. A system receives a first request to access content associated with a resource identifier. The system then determines to generate a second request for validating the content based, at least in part, on the resource identifier and to transmit the second request to a validation service. The system receives validation information based, at least in part, on the second request. In one embodiment, the validation information includes a preview of the content. | 2012-03-29 |
20120079563 | METHOD AND APPARATUS FOR MINIMIZING NETWORK VULNERABILITY VIA USB DEVICES - A device for preventing the rewriting and revision of the firmware installed on one or more USB devices, the device including a male Universal Serial Bus (USB) connector for connecting the device to a host, a female USB connector for receiving the USB device, an integrated circuit, and a detector blocking the transmission of a device firmware update (DFU) from the host to USB device. | 2012-03-29 |
20120079564 | METHOD AND APPARATUS FOR PERFORMING AN AUTHENTICATION AFTER CIPHER OPERATION IN A NETWORK PROCESSOR - A method and apparatus is described for processing of network data packets by a network processor having cipher processing cores and authentication processing cores which operate on data within the network data packets, in order to provide a one-pass ciphering and authentication processing of the network data packets. | 2012-03-29 |
20120079565 | METHODS AND SYSTEMS FOR PROVIDING WEB APPLICATIONS - Methods and systems consistent with certain disclosed embodiments provide applications. In one embodiment, a system is disclosed that provides applications. The system may include a computer system that receives a request related to an application and a database system. The database system may include a database and an application server module and a framework of software modules logically arranged to provide controlled access to data in the database. The application server module may use the data to generate content to generate a Web page related to the application. Further, the software modules may be logically arranged in layers such that access to data or software in a software module of one layer is performed by executing software in another software module of another layer. | 2012-03-29 |
20120079566 | SECURE OUT-OF-BAND MANAGEMENT OF COMPUTING DEVICES OVER A COMMUNICATIONS NETWORK - A method on a computer system for facilitating management of virtual machines in a private data center over a communications network can be provided. The method can include receiving, by a first computer in the private data center, a request via the communications network from a user for access to a subset of a plurality of virtual machines in the private data center. The method can further include executing a first authentication process by proxy between the user and the first computer and executing a second authentication process by proxy between the user and a second computer at the private data center. The method can further include establishing a secure, out-of-band connection between the user and the subset of the plurality of virtual machines in the private data network and restricting access of the user to the subset of the plurality of virtual machines according to permissions associated with the user. | 2012-03-29 |
20120079567 | WIRELESS MANAGER AND METHOD FOR CONFIGURING AND SECURING WIRELESS ACCESS TO A NETWORK - The disclosure provides a wireless manager operable to receive a request from a mobile device to wirelessly communicate with a network, wherein the request may include information to dynamically identify a location associated with the mobile device. The wireless manager may be further operable to automatically associate the mobile device with an access zone comprising one or more physical or logical characteristics, compare the location associated with the mobile device to the access zone, and authorize the mobile device to wirelessly communicate with the network if the location associated with the mobile device indicates that the mobile device does not violate the access zone. | 2012-03-29 |
20120079568 | CONFIGURABLE WEBSITE AND SYSTEM WITH ACCESS CONTROL AND SOCIAL NETWORK FEATURES - A web-based system allows for publishing a website with features and access configured on a user-by-user basis by the website owner to present personal data as well as social network feeds in a single interface. The website owner can update and manage his/her social media from the same page, as well as organize private data if desired. The system includes a messaging function, in accordance with which users can drop a message into the message service of a site owner, and it gets delivered to the site owner in exactly the manner specified by the site owner. | 2012-03-29 |
20120079569 | FEDERATED MOBILE AUTHENTICATION USING A NETWORK OPERATOR INFRASTRUCTURE - Architecture that utilizes the strong authentication mechanisms of network operators to provide authentication to mobile applications by identity federation. When a mobile client initiates request for access to an application outside the network operation infrastructure, the request is passed to an associated application secure token service. The application secure token service has an established trust and identity federation with the network operator. The application secure token service redirects the request to a network operator security token server, which then passes the request to a network operator authentication server for authentication against an operator identity service. Proof of authentication is then issued and returned from the network operator security token server to the application secure token service and the application, which allows the mobile client to access the application. | 2012-03-29 |
20120079570 | METHOD AND APPARATUS FOR ACCELERATED AUTHENTICATION - Techniques for accelerated authentication include receiving first data that indicates a first portion of user credentials for a first user but not a second portion. It is verified whether the first portion of user credentials is valid. If the first portion of user credentials is valid, then second data that indicates a valid value for the second portion of user credentials for the first user is sent. Other techniques include receiving first data that indicates a first portion of user credentials for a first user but not a second portion of user credentials for the first user. A first message that indicates the first portion of user credentials is sent to a remote process that initiates authentication of the first user based on the first portion of user credentials before receiving second data that indicates the second portion of user credentials for the first user. | 2012-03-29 |
20120079571 | AUTOMATED ENCRYPTION AND PASSWORD PROTECTION FOR DOWNLOADING DOCUMENTS - A method receives a user login from a user. The method grants, to the user, access to a user account of the user maintained by a computerized document management system based on the user login. The computerized document management system is accessible to a plurality of users. The method receives a request from the user to provide a requested document and the method determines whether the requested document should be password protected. If the requested document should be password protected, the method generates a unique password for the requested document. The unique password is unique to the user and is based upon information contained within the user account by the computerized document management system. Again, if the requested document should be password protected, the method adds the unique password to the requested document to generate a password-protected document and sends the password-protected document to the first user. | 2012-03-29 |
20120079572 | SYSTEM AND METHOD FOR MANAGING USER TOKEN IN CLIENT DEVICE ON NETWORK - A user token management system in a client device on a network comprises an obtaining module, a web controller and a processing module. The obtaining module obtains a user token from a database in response to a retrieving request for retrieving authorization of a web service provider on the network. The web controller transmits an authenticating request for authenticating the user token to the web service provider and receives an authentication result authenticating the user token. The processing module deletes the user token from the database when that user token is not authenticated by the web service provider. | 2012-03-29 |
20120079573 | INFORMATION PROCESSING DEVICE, PASSWORD DIAGNOSING METHOD AND COMPUTER-READABLE MEDIUM - A user terminal includes a diagnosing unit | 2012-03-29 |
20120079574 | Predictive Mechanism for Multi-Party Strengthening of Authentication Credentials with Non-Real Time Synchronization - A mechanism for strengthening authentication credentials for accessing any number of applications across multiple access interfaces and across multiple remote access sites is disclosed. The applications can be accessed by a set of authorized users by using multiple instances of a predictive scheme for generating and synchronizing the authentication credentials and by leveraging pre-existing infrastructure associated with the applications. | 2012-03-29 |
20120079575 | System Architecture and Method for Secure Web Browsing Using Public Computers - A secure web browsing method and web browsing security system architecture for a mobile device that has initiated an internet communication session via a local area network (LAN) are provided. The architecture establishes a communication link between the mobile device and a computer having an internet browser capable of internet communication via the LAN. A routine is transmitted from the mobile device to the computer via the communication link. The routine synchronizes page content of the mobile device to the computer's internet browser. The architecture (i) detects user-supplied inputs to the page content on the computer's internet browser, (ii) generates a verification request at the mobile device when at least a portion of the user-supplied inputs are so-detected, and (iii) transmits the user-supplied inputs from the mobile device as an internet communication via the LAN only when the verification request is confirmed by the user at the mobile device. The architecture also processes each new page loaded at the mobile device to perform at least one of removal and obfuscation of selected information associated with the new page in order to generate a modified page that is transmitted to the computer using the communication link. The page content of the computer's internet browser is updated to the modified page using the routine previously transmitted to the computer via the communication link. | 2012-03-29 |
20120079576 | Authentication Method and Apparatus - An identity authentication method is provided. The method comprises obtaining records information of a valid user, where the records information indicates behaviors having been executed by the valid user; mapping, based on an orthogonal behavior model having multiple mutually orthogonal dimensions, records information to the multiple dimensions, wherein behaviors indicated by records information mapped to different dimensions do not overlap therebetween and have no logical cause and effect relationship; sampling records information mapped to different dimensions, respectively, so as to generate an authentication questionnaire including a plurality of authentication questions; computing, responsive to answers of a client to the authentication questionnaire, a total confidence P for the client being a valid user; outputting a positive authentication result, responsive to the total confidence probability P falling into a confidence interval; and outputting a negative authentication result, responsive to the total confidence probability P failing to fall into a confidence interval. The present invention further provides a corresponding identity authentication apparatus. | 2012-03-29 |
20120079577 | VIDEO BROADCASTING TO MOBILE COMMUNICATION DEVICES - A device receives login information and a content stream request from a user device connected to a wireless access network, and authenticates, via a backend server device, the user device based on the login information. The device also provides, when the user device is authenticated, a content link and a license key to the user device, and the user device provides the content link and the license key to a content delivery device. The device further verifies the license key for the content delivery device, and the content delivery device establishes a secure connection with the user device via the wireless access network, retrieves the requested content stream based on the content link, and provides the content stream to the user device via the secure connection. | 2012-03-29 |
20120079578 | WEB BROWSER PLAYBACK FOR A VIDEO PROVISIONING SYSTEM - A method, performed by a video provisioning system, may include receiving a request for a first digital rights management (DRM) token, associated with a video asset purchased via the video provisioning system, from a browser application associated with a user device and providing the first DRM token to the browser application. The method may further include receiving a license authorization request to issue a DRM license for the video asset, where the license authorization request is received from a license server, where the DRM license is to be used by the user device to decrypt the video asset, and where the license authorization request includes a second DRM token; determining whether the second DRM token matches the first DRM token; and authorizing the license server to issue the DRM license for the video asset, when the second DRM token matches the first DRM token. | 2012-03-29 |
20120079579 | BIOMETRIC AUTHENTICATION SYSTEM, BIOMETRIC AUTHENTICATION SERVER, METHOD AND PROGRAM THEREOF - An authentication system in which a authentication server and a plurality of clients are coupled through a network and configured to process an authentication from a user of a client, is configured to determine as a cache target user another user who is different from the user who requested the authentication; is configured to generate an identifier that indicates the cache target user; and is configured to transmit biometric data of the cache target user and the identifier to the client from which the authentication of the user was requested. A cache availability determiner can determine whether biometric data of any cache target user are available on a client. | 2012-03-29 |
20120079580 | SYSTEM AND METHOD FOR FACILITATING PROTECTION AGAINST RUN-AWAY SUBNET MANAGER INSTANCES IN A MIDDLEWARE MACHINE ENVIRONMENT - A system and method can support a middleware machine environment that includes a set of subnet manager instances, which reside on one or more nodes in the middleware machine environment and cooperate to provide a highly available subnet manager service within a subnet, wherein each said subnet manager instance is associated with a different private secure key. The subnet manager instances can negotiate with each other and elect a master subnet manager responsible for configuring and managing the middleware machine environment using the private secure key associated with the master subnet manager. The subnet can be reconfigured to be associated with a different private secure key, when a new subnet manager instance is elected as the master subnet manager. An old master subnet manager can be automatically prevented from resuming normal operations as the master subnet manager, in order to avoid undesired consequence such as a “split brain” scenario. | 2012-03-29 |
20120079581 | Method and System Using Universal ID and Biometrics - A universal ID and biometrics systems and methods are disclosed. A method includes receiving an authentication request message originating from a user. The authentication request message includes a first identifier and a second identifier, where the second identifier includes biometric data. The method further includes determining a third identifier based on the first identifier and sending the second and third identifiers to a first server computer to determine if the second and third identifiers have a predetermined correlation. The method further includes receiving confirmation of user authentication if the identification system determines that the second and third identifiers have the predetermined correlation. | 2012-03-29 |
20120079582 | AUTHENTICATING AN AUXILIARY DEVICE FROM A PORTABLE ELECTRONIC DEVICE - This document discusses, among other things, a method for authenticating a browser executing on an auxiliary device with a web service executing on a portable electronic device. The method includes receiving a request for a resource from the browser, determining whether the request identifies a protected resource, and selectively authenticating the request based on whether the request identifies a protected resource. | 2012-03-29 |
20120079583 | OFFLOAD READS AND WRITES - Aspects of the subject matter described herein relate to offload reads and writes. In aspects, a requestor that seeks to transfer data sends a request for a representation of the data. In response, the requestor receives one or more tokens that represent the data. The requestor may then provide one or more of these tokens to a component with a request to write data represented by the one or more tokens. In some exemplary applications, the component may use the one or more tokens to identify the data and may then read the data or logically write the data without additional interaction with the requestor. Tokens may be invalidated by request or based on other factors. | 2012-03-29 |
20120079584 | Authenticating A Node In A Communication Network - A method and apparatus for authenticating a first node's identity in a communication network. An authentication node receives from a second node an authentication request. The authentication request includes a first certificate that has previously been presented to the second node by a node purporting to be the first node. The authentication node retrieves a second certificate belonging to the first node from the first node, and compares the first certificate with the second certificate. If the certificates match, then the first node's identity can be authenticated but if the certificates do not match, then the first node's identity cannot be authenticated. The results of the comparison are then sent to the second node. | 2012-03-29 |
20120079585 | PROXY AUTHENTICATION AND INDIRECT CERTIFICATE CHAINING - Embodiments of proxy authentication and indirect certificate chaining are described herein. In an implementation, authentication for a client occurs via a proxy service. Proxy service communicates between client and server, and caches security tokens on behalf of the client. In an implementation, trustworthiness of certificate presented to a client to establish trust is determined utilizing a signed data package which incorporates a plurality of known certificates. The presented certificate is verified without utilizing root certificates installed on the client device. | 2012-03-29 |
20120079586 | METHOD AND APPARATUS FOR DIFFERENTIATED ACCESS CONTROL - A method for differentiated access control on a computing device, and the computing device, the method including starting a timer on the computing device; resetting the timer if activity occurs on the computing device prior to the expiration of the timer; and preventing a subset of applications from being launched or enabled on expiry of the timer. | 2012-03-29 |
20120079587 | ELECTRONIC DEVICE WITH WEBCAM SECURITY FUNCTION AND METHOD THEREOF - An electronic device with a webcam security function includes an input unit, a power supply unit, a webcam, a thin film transistor liquid crystal display (TFT-LCD) and a processing unit. The processing unit includes a receiving module, a detection module and a power control module. The receiving module receives an input operation from the input unit. The detection module detects whether the received input operation matches a predetermined input operation. The power control module controls the power supply unit to supply power to the TFT-LCD when the received input operation matches the predetermined input operation, thus enabling light to pass through the TFT-LCD to the webcam. | 2012-03-29 |
20120079588 | Methods, Systems, and Products for Identity Verification - Methods, systems, and products verify identity of a person identification verification. A signature, representing the presence of a device, is acquired. The signature is compared to a reference signature. When the signature favorably compares to the reference signature, then the identity of a user associated with the device is verified. | 2012-03-29 |
20120079589 | SYSTEM AND METHOD FOR AUTHENTICATION USING A SHARED TABLE AND SORTING EXPONENTIATION - Disclosed herein are systems, computer-implemented methods, and computer-readable media for authentication using a shared table. The method receives an authentication challenge from a first entity including an accumulator with an initial value, lists of elements in a shared table, and a list of sorting algorithms, each sorting algorithm is associated with one of the lists of elements and modified to include embedded instructions operating on the accumulator. The method then generates a temporary table for each list of elements in the shared table by copying elements from the shared table as indicated in each respective list of elements, each temporary table being associated with one sorting algorithm in the list of sorting algorithms. The method sorts each generated temporary table with the associated sorting algorithm, thereby updating the accumulator with the embedded instructions. Finally, the method transmits the updated accumulator to the first entity for verification. | 2012-03-29 |
20120079590 | METHOD FOR ENFORCING RESOURCE ACCESS CONTROL IN COMPUTER SYSTEMS - A method and system for enforcing access control to system resources and assets. Security attributes associated with devices that initiate transactions in the system are automatically generated and forwarded with transaction messages. The security attributes convey access privileges assigned to each initiator. One or more security enforcement mechanisms are implemented in the system to evaluate the security attributes against access policy requirements to access various system assets and resources, such as memory, registers, address ranges, etc. If the privileges identified by the security attributes indicate the access request is permitted, the transaction is allowed to proceed. The security attributes of the initiator scheme provides a modular, consistent secure access enforcement scheme across system designs. | 2012-03-29 |
20120079591 | Data Filtering for Communication Devices - Technologies are generally described for data filtering for communication devices. In one example, a method of receiving data from a data source on a communication device is disclosed. The method includes determining, at the communication device, a domain name of the data source. The method also includes determining, at the communication device, one or more communication networks the communication device is connected to. The method further includes processing, at the communication device, the domain name for acceptance based on the one or more connected communication networks. The method also includes receiving the data from the data source, at the communication device, if the domain name is accepted. | 2012-03-29 |
20120079592 | IP PRIORITIZATION AND SCORING SYSTEM FOR DDOS DETECTION AND MITIGATION - A method and system to mitigate an attack over the Internet includes collecting information related to a plurality of client IP addresses from a plurality of sources and analyzing the collected information to determine confidence scores for the plurality of client IP addresses. The method and system also include receiving network traffic from the Internet and limiting network traffic from a first subset of the plurality of client IP addresses characterized by a confidence score less than a first threshold. The method, and system further include determining a level of the network traffic and limiting network traffic from a second subset of the plurality of client IP addresses characterized by a confidence score less than a second threshold greater than the first threshold. | 2012-03-29 |
20120079593 | System and Method For Hindering a Cold Boot Attack - A method for hindering a cold boot attack on a user equipment (UE) is provided. The method includes, in response to detection of the cold boot attack, executing prioritized security procedures. A user equipment (UE) is also provided that includes a processor configured to execute prioritized security procedures responsive to detection of a cold boot attack. | 2012-03-29 |
20120079594 | MALWARE AUTO-ANALYSIS SYSTEM AND METHOD USING KERNEL CALLBACK MECHANISM - In a malware auto-analysis method using a kernel callback mechanism, a function, present in a kernel driver within a PsSetCreateProcessNotifyRoutine function, is registered by a process monitor driver as a callback function when a computer boot. A function present in a registry monitor driver is registered by the registry monitor driver as a callback function in a CmRegisterCallback function when the driver is loaded. A kernel driver is registered by a file monitor driver as a mini-filter driver in a Filter Manager present in a Windows system. At least one of a process event, a registry event, or an Input/Output (I/O) event is received by a behavior event collector from the process monitor driver, the registry monitor driver, or the file monitor driver, respectively. | 2012-03-29 |
20120079595 | Snoop Echo Response Extractor - A mechanism is provided for identifying a snooping device in a network environment. A snoop echo response extractor generates an echo request packet with a bogus MAC address that will only be received by a snooping device. The snoop echo response extractor also uses an IP address that will cause the snooping device to respond to the echo request. | 2012-03-29 |
20120079596 | METHOD AND SYSTEM FOR AUTOMATIC DETECTION AND ANALYSIS OF MALWARE - A method of detecting malicious software (malware) includes receiving a file and storing a memory baseline for a system. The method also includes copying the file to the system, executing the file on the system, terminating operation of the system, and storing a post-execution memory map. The method further includes analyzing the memory baseline and the post-execution memory map and determining that the file includes malware. | 2012-03-29 |
20120079597 | MOBILE COMMUNICATION SYSTEM AND MOBILE TERMINAL HAVING FUNCTION OF INACTIVATING MOBILE COMMUNICATION VIRUSES, AND METHOD THEREOF - A mobile communication system for inactivating a virus includes: a database associated with the mobile communication system, for storing at least one virus vaccine program; and a virus monitoring unit associated with the mobile communication system, for checking virus infection of received data, analyzing virus information, choosing one of virus vaccine programs that are stored in the database and inactivating the virus. Virus vaccine programs are timely updated over the air (OTA) whenever a new version of vaccine program is available. | 2012-03-29 |
20120079598 | TIERED RISK MODEL FOR EVENT CORRELATION - A method for real-time threat monitoring includes identifying two or more real time vulnerabilities, each associated with one or more objects of an enterprise, correlating the two or more real-time vulnerabilities to each other, applying a risk tiering model to the correlated real-time vulnerability, thereby classifying the correlated real-time vulnerability into risk tiers, and initiating an alert based on the correlated real-time vulnerability and the risk tiers into which the correlated real-time vulnerability is classified. According to other embodiments a method includes applying a risk methodology to log data contained in one or more object logs thereby identifying one or more security events, applying a risk tiering model to the one or more security events, thereby classifying the security events into risk tiers, and initiating an alert based on the security events and the risk tiers into which the security events are classified. | 2012-03-29 |
20120079599 | Non-transitory computer readable storage medium, access filtering device, and access filtering method - An access filtering device includes a receiving unit that receives a URL of a prohibited site or a prohibited page; an executing unit that accesses the page by using the URL; an acquiring unit that acquires page information corresponding to the URL; a prohibited site list that includes character strings of prohibited sites and prohibited pages; a determining unit that determines whether the URL is a character string of a prohibited site or a prohibited page; a display control unit that, when the URL is a character string of a prohibited site or a prohibited page, displays the page in a decreased page-readability state, i.e., in a transparent state. | 2012-03-29 |
20120079600 | MEDIA PROCESSING SYSTEM SUPPORTING DIFFERENT MEDIA FORMATS VIA SERVER-BASED TRANSCODING - A method for processing media content includes receiving, at a second communications device communicatively coupled to a network at a first geographic location, from a first wireless mobile communications device communicatively coupled to the second communications device at the first geographic location, a device profile of the first wireless mobile communications device. The device profile received from the first wireless mobile communications device and media content may be sent to a server communicatively coupled to the network at a second geographic location. Media content may be received from the server, where the media content has been reformatted based on the device profile. The reformatted media content may be transmitted to the first wireless mobile communications device. The received device profile of the first wireless mobile communication device may be stored. | 2012-03-29 |
20120079601 | PORTABLE LICENSE SERVER - A portable license for licensed content is obtained by a user along with a regular license in a local network, such as a home network or other private network. The portable license may be stored in a license server on a portable device, such as a smart phone or a tablet, which functions as a portable license server. The user may take the portable device to another location where it joins another local network. A device in the second network, which does not have a license to play the licensed content, may use the portable license on the portable device to execute the content, enabling the user to enjoy it in multiple environments. The device (e.g., a TV) in the second network may continue to play the content as long as the portable license or another valid license is present in the network. | 2012-03-29 |
20120079602 | Garbled Circuit Generation in a Leakage-Resilient Manner - Methods and apparatus are provided for generating a garbled circuit for a client in a leakage-resilient manner, for use in secure function evaluation between the client and a server. The garbled circuit is generated by obtaining a token from the server, wherein said token comprises a leakage-protected area; querying the token gate-by-gate, wherein for each gate of said garbled circuit, the token interacts with the leakage-protected area to generate a garbled table for the gate; and receiving the garbled circuit from the token. The client can interact with the server to obtain garbled inputs; and then evaluate the garbled circuit on the garbled inputs to obtain a garbled output. A final output can be obtained by matching the garbled output with an output table in the garbled circuit. | 2012-03-29 |
20120079603 | SELECTIVELY WIPING A REMOTE DEVICE - A system and method for selectively securing data from unauthorized access on a client device storing a plurality of data types with reference to an authorization level indicated in a command. A command is received at a client device comprising an authorization level indicator. Based on at least one predefined rule, which may be implemented in an IT policy stored at the client device, each of the plurality of data types to be secured is determined, and then the data corresponding to those types is secured. The data may be secured by encrypting and/or deleting the data at the client device. The predefined rules associated with each authorization level may be configured by a user or administrator having an authorization level that exceeds the associated authorization level. | 2012-03-29 |
20120079604 | INFORMATION TRANSMISSION APPARATUS, DATA TRANSMISSION APPARATUS, INFORMATION TRANSMISSION DESTINATION DESIGNATING METHOD, DATA TRANSMITTING METHOD, PROGRAM AND STORAGE MEDIUM - In order to enable utilization of a personal address book by another person while maintaining security, in case display of information on an information destination registered in the address book is requested from an unauthenticated user, a display is executed in a state where address information (fax number, e-mail address etc.) is concealed (for example by a mosaic pattern), and information on the information destination, displayed with the address information in such concealed state, can be designated as the information designation. | 2012-03-29 |
20120079605 | Methods and Arrangements for Rendering Real-Time Media Services - The present invention relates to methods and arrangements for rendering a radio service. The radio service signal broadcasted to radio devices is divided into a plurality of different signals. The different signals may be retrieved via different channels and from different sources. Hence, the radio service signal is at least divided into a DJ signal containing a program guide and e.g. DRM keys, which may be retrieved from a media server e.g. hosted by a provider providing a radio channel and a payload signal, which may be retrieved from memory storage in device or a content server, with the payload (typically music). According to an embodiment of the present invention the radio signal comprises further a host signal. The host signal comprises voice content, commercial advertisements etc. The host signal may be retrieved from a content server e.g. hosted by the provider providing the radio channel. The radio service may be created by combining the DJ signal, the radio host signal and the payload signal, wherein the service is mastered by the DJ signal. | 2012-03-29 |
20120079606 | RIGHTS AND CAPABILITY-INCLUSIVE CONTENT SELECTION AND DELIVERY - Intelligent content delivery enables content to be delivered to different devices in formats appropriate for those devices based on the capabilities of those devices. A user might access the same piece of content on two different devices, and can automatically receive a higher quality format on a device capable of playing that higher quality format. The user can purchase rights to content in any format, such that as new formats emerge or the user upgrades to devices with enhanced capabilities, the user can receive the improved formats automatically without having to repurchase the content. Further, the user can pause and resume content between devices even when those devices utilize different formats, and can access content on devices not otherwise associated with the user, receiving content in formats that are appropriate for those unknown devices even if the user has not previously accessed content in those formats. | 2012-03-29 |
20120079607 | Request Based License Mode Selection - Methods and systems are disclosed for providing a mechanism for dynamically switching between the licensing modes on the remote presentation host to handle different kinds of licenses. In one embodiment, the mode switching may be based on the configuration of the users that are connecting to the remote presentation host. In an embodiment, users may be provided with remote presentation session files that define what type of license to be used for the current connection to the remote presentation host. In some embodiments, mechanisms are disclosed to provide the ability to convert a remote client access license from one type to another by using a convertibility matrix. | 2012-03-29 |
20120079608 | SYSTEMS AND METHODS TO PROVIDE A SOFTWARE BENEFIT WHEN A CONSUMER OBJECT IS RECOGNIZED IN AN IMAGE - According to some embodiments, it may be recognized that a consumer has placed a consumer object, such as a toy or action figure, into a field of view of a camera (e.g., a video camera incorporated into a portable computer). A software benefit associated with the consumer object may then be automatically determined, and, responsive to the recognition and determination, it may be arranged for the consumer to receive that software benefit (e.g., in a virtual world). | 2012-03-29 |
20120079609 | METHOD FOR ESTABLISHING A PLURALITY OF MODES OF OPERATION ON A MOBILE DEVICE - A method, device and system for establishing plural modes of operation on a mobile device, including: associating each application on the mobile device with one of a plurality of modes; and restricting access to data on the mobile device to only a subset of applications based on the mode associated for the each application. A system includes connection of an untrusted device to a trusted device and restricting data access for restricted data to a subset of trusted applications on the untrusted device. | 2012-03-29 |
20120079610 | CONTENT MANAGEMENT PROGRAM, METHOD AND DEVICE - An encrypted content and its encryption key under a copy right use condition of prohibiting a copy by the device having received a content are stored, and the encrypted content is copy-transferred with another device through the network, and at the same time, the encryption key is transferred through the network, so that it is stored in either one of the devices. | 2012-03-29 |
20120079611 | TL1A MODEL OF INFLAMMATION FIBROSIS AND AUTOIMMUNITY - This invention relates transgenic animals that overexpress TL1A in a tissue specific manner to model inflammatory bowel disease (IBM such as colitis, Crohn's disease and ulcerative colitis, fibrosis, and related inflammatory diseases and conditions. TL1A transgenic animals constitutively express both TL1A and GFP in lymphoid and myeloid cell lineages, allowing convenient identification and sorting of immune cells involved in IBD disease progression, such as T-cells, antigen presenting cells (APC), and dendritic cells (DC). TL1A transgenic animals may be induced to exhibit gross fibrosis, or isolated cells may be implanted into immunodeficient mice to establish colitis. | 2012-03-29 |
20120079612 | Dry eye animal model - A first embodiment is a dry eyed animal model method by peri or post-menopausal estrogen-treated rats have decreased tear production wherein the menopausal rat may be produced by ovariectomy Chronic estrogen exposure can decrease tear production in rats receiving a nine month course of estrogen versus placebo treatment after ovariectomy. The aged, chronically estrogen-treated female rats can provide a suitable model for the study of KCS and its treatment. | 2012-03-29 |
20120079613 | Homeobox Transcription Factor BSX and Uses Thereof for Treating Diseases, in Particular Obesity - The present invention relates to the human homeobox transcription factor Bsx protein, nucleic acids encoding for said protein, vectors and cells comprising the nucleic acids, antibodies directed against Bsx, and methods for identifying compounds binding to Bsx, as well as to the use of proteins, nucleic acids, vectors, cells, and interacting compounds for treating obesity and related diseases. | 2012-03-29 |
20120079614 | CD109 POLYPEPTIDES AND USES THEREOF FOR THE TREATMENT OF SKIN CELLS - The invention concerns compounds, compositions and methods for the treatment of skin cells. Described herein are CD109 polypeptides and uses thereof for the in vivo treatment of various skin disorders, including skin fibrosis, skin scarring, wound healing and psoriasis. | 2012-03-29 |
20120079615 | KNOCK-IN MICE WITH INDUCIBLE LOSS OF EOSINOPHILS - Gene knock-in mice having a targeted insertion of the human diphtheria toxin receptor within the eosinophil peroxidase locus are described. Administering diphtheria toxin to such animals results in the loss of eosinophils in the animal. Accordingly, the knock-in mice and nucleic acid constructs featured in the document can be used to generate eosinophil-deficient transgenic animals that are useful for studying pathologies and treatments relating to tissues and organ systems that typically contain eosinophils. | 2012-03-29 |
20120079616 | NPC1L1 (NPC3) AND METHODS OF USE THEREOF - The present invention provides human, rat and mouse NPC1L1 polypeptides and polynucleotides encoding the polypeptides. Also provided are methods for detecting agonists and antagonists of NPC1L1. Inhibitors of NPC1L1 can be used for inhibiting intestinal cholesterol absorption in a subject. | 2012-03-29 |
20120079617 | PEPPER HYBRID PS16364674 - The invention provides seed and plants of pepper hybrid PS16364674 and the parent lines thereof. The invention thus relates to the plants, seeds and tissue cultures of pepper hybrid PS16364674 and the parent lines thereof, and to methods for producing a pepper plant produced by crossing such plants with themselves or with another pepper plant, such as a plant of another genotype. The invention further relates to seeds and plants produced by such crossing. The invention further relates to parts of such plants, including the fruit and gametes of such plants. | 2012-03-29 |
20120079618 | BITTER MELON VARIETY CBM12 AND PRODUCTS THEREFROM - The present invention relates to bitter melon breeding and products, in particular, to a new bitter melon variety designated CBM12. | 2012-03-29 |
20120079619 | Rice Cultivar Roy J - A rice cultivar designated Roy J is disclosed. The invention relates to the seeds of rice cultivar Roy J, to the plants of rice cultivar Roy J, to plant parts of rice cultivar Roy J, and to methods for producing a rice plant produced by crossing rice cultivar Roy J with itself or with another rice variety. The invention also relates to methods for producing a rice plant containing in its genetic material one or more transgenes and to the transgenic rice plants and plant parts produced by those methods. This invention also relates to rice cultivars, or breeding cultivars, and plant parts derived from rice cultivar Roy J, to methods for producing other rice cultivars, lines or plant parts derived from rice cultivar Roy J, and to the rice plants, varieties, and their parts derived from use of those methods. The invention further relates to hybrid rice seeds, plants, and plant parts produced by crossing rice cultivar Roy J with another rice cultivar. | 2012-03-29 |
20120079620 | STORAGE-INDUCED PROMOTER - A promoter with an organ-specific activity in plants. The promoter is characterized in that it exhibits greater activity in the storage organs of plants than in other organs of said plants and that the promoter activity is modified after the harvest of the storage organs and is greater than prior to said harvest. | 2012-03-29 |
20120079621 | GENES ASSOCIATED TO SUCROSE CONTENT - Modern sugarcane cultivars are complex hybrids resulting from crosses among several species of the | 2012-03-29 |
20120079622 | Yield Enhancement in Plants by Modulation of a ZM-LOBDP1 Protein - Compositions and methods for modulating plant development and for increasing yield in a plant are provided. The compositions include a ZM-LOBDP1 sequence. Compositions of the disclosure comprise amino acid sequences and nucleotide sequences selected from SEQ ID NOS: 1 and 2 as well as variants and fragments thereof. Nucleotide sequences encoding the ZM-LOBDP1 molecule are provided in DNA constructs for expression in a plant of interest are provided for modulating the level of a ZM-LOBDP1 sequence in a plant or a plant part are provided. The methods comprise introducing into a plant or plant part a heterologous polynucleotide comprising a ZM-LOBDP1 sequence of the disclosure. The level of the ZM-LOBDP1 polypeptide can be increased or decreased. Such method can be used to increase the yield in plants; in one embodiment, the method is used to increase grain yield in cereals. | 2012-03-29 |
20120079623 | Yield Enhancement in Plants by Modulation of a ZM-ZFP1 Protein - Compositions and methods for modulating plant development and for increasing yield in a plant are provided. The compositions include a ZM-ZFP1 sequence. Compositions of the disclosure comprise amino acid sequences and nucleotide sequences selected from SEQ ID NOS: 1 and 2 as well as variants and fragments thereof. Nucleotide sequences encoding the ZM-ZFP1 molecule are provided in DNA constructs for expression in a plant of interest are provided for modulating the level of a ZM-ZFP1 sequence in a plant or a plant part are provided. The methods comprise introducing into a plant or plant part a heterologous polynucleotide comprising a ZM-ZFP1 sequence of the disclosure. The level of the ZM-ZFP1 polypeptide can be increased or decreased. Such method can be used to increase the yield in plants; in one embodiment, the method is used to increase grain yield in cereals. | 2012-03-29 |
20120079624 | METHODS FOR PLANT REGENERATION, TRANSFORMATION AND PRODUCTION OF INSECT RESISTANT TRANSGENIC OKRA - The present description concerns methods for regeneration of whole plant from the explants obtained from the | 2012-03-29 |
20120079625 | Method for protecting living plants from harmful insects via a sheetlike structure - The present invention provides a method for protecting living plants from harmful insects by using a sheetlike structure impregnated with an insecticide to cover the surface of the trunk, pseudotrunk, branch, root ball and/or root region of the plant. Additionally provided are living plants whose trunk, pseudotrunk, branch, root ball and/or root region surface is covered with a sheetlike structure impregnated with an insecticide. The invention also relates to a rectangular sheetlike structure impregnated with an insecticide and comprising a fastening means which, following tubular coverage of the surface of trunk, pseudotrunk or branch of a plant, allows a permanent hold thereto. It further relates to a sheetlike structure impregnated with an insecticide, in the form of a perforated sheet which has a continuous interruption between the outer and inner edges. Lastly, it also relates to the use of the sheetlike structure for protecting living plants from harmful insects. | 2012-03-29 |
20120079626 | LIPASE POLYPEPTIDE - We describe a plant lipase polypeptide and nucleic acids that encode said polypeptide which has homology to a patatin and which has phospholipase and/or triacylglycerol lipase activity. | 2012-03-29 |
20120079627 | PLANT GENE REGULATORY ELEMENTS - Nucleic acids, vectors, and expression vectors comprising novel plant gene regulatory elements from poplar that can drive heterologous gene expression in plants. Novel transgenic plants expressing heterologous genes under the control of novel gene regulatory elements. | 2012-03-29 |
20120079628 | COMPOSITIONS AND METHODS FOR MODULATION OF PLANT CELL DIVISION - The present invention provides compositions and methods for modulating cell division in plants. In particular, the present invention provides polynucleotides that encode REVOLUTA. In addition, REVOLUTA vectors and transformed plants are provided wherein plant cell division is modulated by expression of a REVOLUTA transgene as compared to a control population of untransformed plants. The present invention also provides methods for the isolation and identification of REVOLUTA genes from higher plants. | 2012-03-29 |
20120079629 | AUTOMATED SEED SAMPLER AND METHODS OF SAMPLING, TESTING AND BULKING SEEDS - A population of seeds wherein substantially all of the seeds in the population have a portion of seed tissue removed by an automated sampling system. Substantially all of the seeds in the population have the presence or absence of at least one transgene in common, and/or substantially all of the seeds in the population have a high recurrent parent allele frequency. The presence or absence of the at least one transgene in the seeds in the population and/or the recurrent parent allele frequency in the seeds in the population is determined by analyzing the portion of seed tissue removed from the seeds by the automated sampling system. | 2012-03-29 |
20120079630 | SUB-MICROSECOND-RESOLUTION PROBE MICROSCOPY - Methods and apparatus are provided herein for time-resolved analysis of the effect of a perturbation (e.g., a light or voltage pulse) on a sample. By operating in the time domain, the provided method enables sub-microsecond time-resolved measurement of transient, or time-varying, forces acting on a cantilever. | 2012-03-29 |
20120079631 | Material Property Measurements Using Multiple Frequency Atomic Fore Microscopy - Apparatus and techniques for extracting information carried in higher eigenmodes or harmonics of an oscillating cantilever or other oscillating sensors in atomic force microscopy and related MEMs work are described. Similar apparatus and techniques for extracting information using contact resonance with multiple excitation signals are also described. | 2012-03-29 |
20120079632 | METHOD TO MEASURE 3 COMPONENT OF THE MAGNETIC FIELD VECTOR AT NANOMETER RESOLUTION USING SCANNING HALL PROBE MICROSCOPY - Scanning hall probe microscopy is used to measure 3 components of the magnetic field vector at nanometer resolution by connecting of Hall probe to the end of the piezo scanner, then gluing of the sample to the sample holder, thereafter positioning of the SHPM head under the optical microscope with approximately X40 magnification, then moving back of the slider puck around approximately 30 steps or moving the sensor or sample back by suffient amount using motors, piezo or other positioner such that signal decays to negligible levels; thereafter setting the temperature of cryostat or to desired temperature, then offset nulling of the Hall sensor in gradiometer or normal conditions, and finally setting of the scan area, speed, resolution and the acquisition channels through SPM control program. | 2012-03-29 |
20120079633 | Apparatus and Method for Isolating and Measuring Movement in Metrology Apparatus - An Improved metrology apparatus, such as a scanning probe microscope (SPM), has an actuator that controls motion in three orthogonal directions when it is selectively and electrically stimulated. The X-Y section of the actuator, preferably a piezoelectric actuator, controls motion in the X and Y directions and the Z section of the actuator controls motion in the Z direction. A flexure is attached to the actuator and is mounted on a reference structure to prevent unwanted X and Y motion by the Z section of the actuator from moving a probe attached to the flexure. Preferably, two mirrors are mounted on the flexure. In operation of the SPM, a light beam is directed towards these mirrors. When the flexure moves in the Z direction, one of the mirrors is deflected and causes the reflected light to move across a detector, generating a signal representative of a change in the Z position of the flexure and the probe. | 2012-03-29 |