22nd week of 2010 patent applcation highlights part 69 |
Patent application number | Title | Published |
20100138888 | Receiver and Receiving Method - According to one embodiment, a receiver is connected via a communication network to a broadcast server that transmits a plurality of programs broadcast via the Internet. The receiver includes a storage module, a receiving module, a connection processor, a display module, and a determination module. The storage module stores channels of the programs. The receiving module receives input specifying a first program, from among the programs, to be viewed. The connection processor receives the first program or a second program that is automatically transmitted from the broadcast server from among the programs. The display module displays the first program or the second program. The determination module determines whether the display module displays the first program, and, when determining that the display module displays the first program, stores the channel of the first program in the storage module. | 2010-06-03 |
20100138889 | STREAM CONDITIONING FOR SEAMLESS SWITCHING OF ADDRESSABLE CONTENT ACROSS TRANSPORT MULTIPLEX, USING LOCAL STORED CONTENT AS PRE-ROLL AND POST-ROLL BUFFERS; IN DIGITAL TELEVISION RECEIVERS - A system, method and apparatus to enable a form of addressable advertising content delivery in which multiple addressable content streams are sent in a transport multiplex, Addressable Content Channel Multiplex, different from the Primary Channel Multiplex on which the Primary Channel is delivered describe the present invention. The Primary Channel is network stream onto which the addressable content is to be inserted. Seamless switch between the Primary Channel and the addressable content streams on the Addressable Content Channel Multiplex is accomplished by using Receiver stored content as interim buffers to which the switching happens prior to switching to a different transport multiplex. These buffers in effect feed the audio and video decoders with content, during the time it takes for the tuner to switch to a different transport multiplex. Two content buffers, Pre-roll and Post-roll are used during switching, one from Primary Channel Multiplex to Addressable Content Channel Multiplex and another when switching from the Addressable Content Channel Multiplex to the Primary Channel Multiplex. | 2010-06-03 |
20100138890 | DEVICE TO ALLOW CONTENT ANALYSIS IN REAL TIME - The invention relates to an electronic device for processing input stream data including capturing, watching, digitising compressing, storing and/or analysing analogue or digital stream data consisting of at least one TV tuner and an encoder or a decoder, wherein the encoder or the decoder comprises a terminal or pin providing data of a content analysis. | 2010-06-03 |
20100138891 | METHOD OF DOWNLOADING AND UPDATING APPLICATIONS IN A TELEVISION RECEIVER/DECODER HOUSING - In order to maximize the availability of a television receiver/decoder housing, the invention enables the download of updates while said housing is being used. In order to do so, when the housing detects that an update is available, the housing allocates itself a portion of the acquisition resources of the update in order to store this update in a housing storage memory. Once the download is complete, the user can either activate the update or carry on using a former version of the housing application, the user thus being able to select a microcode version which is activated by default on switching on the receiver/decoder housing. | 2010-06-03 |
20100138892 | APPARATUS AND METHOD FOR MANAGING MEDIA DISTRIBUTION - A system that incorporates teachings of the present disclosure may include, for example, a server having a controller to maintain a delivery session with a set top box for streaming of media content thereto where the media content is multiple content from a plurality of media sources, maintain retrieval sessions for each of the plurality of media sources where the controller switches between the retrieval sessions to obtain the media content while maintaining the delivery session, and temporarily store the media content in a buffer for the streaming to the set top box using the delivery session. Other embodiments are disclosed. | 2010-06-03 |
20100138893 | PROCESSING METHOD FOR ACCELERATING PACKET FILTERING - A processing method for accelerating packet filtering is used for accelerating the filtering process of packet data in a computer. The processing method accelerating packet filtering includes the steps. A plurality of packet filtering policies is loaded. Feature values of each packet filtering policy are resolved. A grouping procedure is performed on the packet filtering policies according to the feature values, so as to add the packet filtering policies meeting a threshold value to corresponding policy groups. A performing sequence of the packet filtering policies in the policy groups is determined according to a performing sequence of the packet filtering policies. A performing sequence of the policy groups is determined according to a producing sequence of the policy groups. A plurality of packet data is received. When the packets don't match the policy groups, the default policy is processed according to protocol information of the packets. | 2010-06-03 |
20100138894 | INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND COMPUTER READABLE MEDIUM - An information processing apparatus includes: a storage that associates each of a plurality of pieces of use limitation information with a characteristic information, and that stores each of the plurality of pieces of use limitation information and the characteristic information, which are associated with each other; and a selection unit that refers to the storage, and that selects, based on a result of comparison between a second document characteristic information of a document acquired from a specified document specified by and in response to an instruction specifying a document for which a policy for limitation on use is to be determined and the characteristic information associated with each of the plurality of pieces of use limitation information stored in the storage, a candidate for use limitation information to be used for the limitation on use of the specified document from the plurality of pieces of use limitation information. | 2010-06-03 |
20100138895 | Module and associated method for TR-069 Object management - The present invention relates to a security module for use in management of a TR-069 Object Model of a device. The Object Model comprises a plurality of parameters for selection by a view selector module based on credentials and for defining thereby an object model view associated to the device. The security module comprises means for associating the object model view to a security policy and means for configuring the security attributes of the security policy on an intermediate network entity. | 2010-06-03 |
20100138896 | INFORMATION PROCESSING SYSTEM AND INFORMATION PROCESSING METHOD - In an information processing system, when an application is added to an information processing apparatus, an identifier of an resource of the information processing apparatus which is used by the application is acquired, and a rule suitable for the application is generated based on a rule defined in advance in correspondence to the resource identifier. The generated rule is applied to the information processing apparatus. | 2010-06-03 |
20100138897 | POLICY-BASED SELECTION OF REMEDIATION - A method, of automatically determining one or more remediations for a device that includes a processor, may include: receiving values of a plurality of parameters which collectively characterize an operational state of the device, there being at least one policy associated with at least a given one of the plurality of parameters, policy defining as a condition thereof one or more potential values of, or based upon, the given parameter, satisfaction of the condition potentially being indicative of unauthorized activity or manipulation of the device; automatically determining, from the received parameter values, whether the conditions for any policies are satisfied, respectively; and automatically selecting one or more remediations for the device according to the satisfied policies, respectively. | 2010-06-03 |
20100138898 | METHOD FOR ACTIVATING VIRTUAL MACHINE, APPARATUS FOR SIMULATING COMPUTING DEVICE AND SUPERVISING DEVICE - A method for activating a virtual machine, an apparatus for simulating a computing device and a device for supervising activation of the apparatus. The method includes: activating a network interface of the virtual machine, and activating other components of the virtual machine, where the network interface of the virtual machine is capable of communicating with the outside world so activation of the other components of the virtual machine can be supervised. The simulation apparatus includes a network interface and an operating system having a security sub-system, where the network interface is configured to be first activated during activation of the simulation apparatus so the network interface can communicate with the outside world, and activation of the other components of the apparatus can be supervised during the activation of the other components of the apparatus. | 2010-06-03 |
20100138899 | AUTHENTICATION INTERMEDIARY SERVER, PROGRAM, AUTHENTICATION SYSTEM AND SELECTION METHOD - An authentication server is dynamically changed in consideration of a user's situation, a kind of service used by the user and user's convenience. When a terminal device | 2010-06-03 |
20100138900 | REMOTE ACCESS OF PROTECTED INTERNET PROTOCOL (IP)-BASED CONTENT OVER AN IP MULTIMEDIA SUBSYSTEM (IMS)-BASED NETWORK - A service control method, device and system for allowing secure, remote access of protected IP-based content delivered over an IMS-based network to one or more devices within a home network. The method involves a remote access device transmitting a remote access request to a service control application in the IMS-based network, the service control application authorizing the remote access request based on a number of criteria, and forwarding the remote access request to the home network. The forwarded remote access request includes information that allows protected content requested by the remote access request to be transmitted from a home network device in the home network to the remote access device upon appropriate verification of the remote access device by the home network device using home network device DRM schemes. Remote access of the protected content can be allowed by relaxing proximity restriction requirements of the home network. | 2010-06-03 |
20100138901 | Managing Online Shop Using Instant Messaging System - A method and a system for managing an online shop use an instant messaging system to allow an auxiliary account to log in and manage an online shop of a primary account user. The primary account user creates an online shop in an online shop server, and associates itself with one or more auxiliary accounts in an instant messaging system. Upon authorization by primary account user to allow an auxiliary account to manage the online shop, the system records an authorization relation between the auxiliary account and the primary account. The authorization relation may be recorded in the instant messaging system. Based on the recorded authorization relation, the system allows a user of the authorized auxiliary account to manage the online shop system through the instant messaging system. An instant messaging server serving for this purpose is also disclosed. | 2010-06-03 |
20100138902 | STANDING ORDER DATABASE SEARCH SYSTEM AND METHOD FOR INTERNET AND INTRANET APPLICATION - An internet and/or intranet based database search system and method for conducting searches of highly confidential records such as individual patient medical records and to automate the process of securing required approvals to make such records available to a properly authorized and authenticated requesting party. The system's central premise is that the patient has a fundamental right to the confidentiality of their personal medical records and should control that right through specific, informed consent each time that a party requests to receive them. It reinforces the widely held conception of privacy in general as well as of the sanctity of the doctor/patient relationship by granting the doctor the right, subject to the patient's express permission, to initiate a search request. At the same time, it provides an expedited and cost-efficient means for transfer of such records as demanded by many healthcare reform proposals and gives the repositories where these records are held the right to stipulate the specific terms and conditions that must be fulfilled before they will release documents entrusted to their care, thereby substantially reducing the risk of litigation alleging breaches of patient confidentiality. And it carries out all of these legitimate interests in a way that is fast, simple to use and easy to audit. The system optionally includes a billing mechanism to pay for any added cost associated with providing this additional protection; and in its preferred embodiment, is applicable to both digital as well as non-digital records. | 2010-06-03 |
20100138903 | Ticket-Based Implementation of Content Leasing - The present invention is a method and system for accessing digital content stored on a computing device. An agreement between a subscriber and a content provider allows the subscriber to lease the digital content from the content provider, and download the digital content from a content server operated by the content provider. The method retrieves a service ticket for the computing device, and retrieves content rights for the digital content. The service ticket includes authorization data, and a session key, where the authorization data include authorized subscription services for the computing device. The content rights include required subscription services for the digital content and are delivered authenticated with the session key. The method allows access to the digital content when the authorized subscription services included with the authorization data match the required subscription services included with the content rights. | 2010-06-03 |
20100138904 | METHOD AND SYSTEM FOR NOTARISING ELECTRONIC TRANSACTIONS - The invention relates to a system comprising: a first computerised system, or emitter, connected to a communication network; a second computerised system, or receiver, connected to said network; and a server connected to said network. Said server operates as a trusted third party for electronic transactions, is adapted in such a way as to offer a custody service and to vouch for the existence and content of an electronic document sent by the emitter, and communicates with a timestamping entity. | 2010-06-03 |
20100138905 | Token-Based Client To Server Authentication Of A Secondary Communication Channel By Way Of Primary Authenticated Communication Channels - The disclosure relates to authenticating a secondary communication channel between a client application and a server application when an authenticated primary communication channel has already been established between the client application and a resource application, on which the server application can store a generated authentication token that only privileged users including the client application user can read-access and send back to the server application by way of the secondary communication channel. | 2010-06-03 |
20100138906 | COMMUNICATION DEVICE SUITABLE FOR SETTING IP ADDRESS OF SERVER CONNECTED TO NETWORK, NETWORK PARAMETER SETTING METHOD AND NETWORK PARAMETER SETTTING PROGRAM PRODUCT - In order to easily set IP addresses required for communicating with apparatuses connected to a network, an MFP includes a port scan unit for acquiring, by port scanning, an IP address of a server having a predetermined port open from one of the servers connected to the network, and a network environment storage part for storing a set of acquired IP address and a port number of the predetermined port. | 2010-06-03 |
20100138907 | METHOD AND SYSTEM FOR GENERATING DIGITAL CERTIFICATES AND CERTIFICATE SIGNING REQUESTS - A certificate server is provided for issuing digital certificates to be used by a network resource and/or a client resource. The certificate server is configured to communicate with the network resource or the client resource to receive a certificate request. Upon receiving the certificate request, the certificate server may automate the process for authenticating the certificate request, validating the terms of the certificate request and digitally signing the certificate request. An authentication appliance may communicate with or be integrated within the certificate server. The certificate server includes a web service server, a certificate authority component, and a database that enable communication with either the network resource, client resource, or the authentication appliance to automate the administration process typically involved in receiving and signing a certificate request. The certificate authority component may sign the certificate request with a trusted root chain associated with the network resource. | 2010-06-03 |
20100138908 | Access Control Method And Apparatus - A method of controlling access to computing resources, comprising providing a first computing device with access to a database containing data indicative of computing resources access to which is controlled by the first computing device and a minimum security capability that a second computing device must possess to access the respective resources, assigning the second computing device a security capability, providing the second computing device with data indicative of the security capability, configuring the first computing device to respond to data indicative of the security capability and data indicative of a desired access from the second computing device by ascertaining the minimum required security capability corresponding to the desired access and by comparing the minimum required security capability with the security capability of the second computing device, and providing the desired access if the security capability of the second computing device meets the minimum security capability for the desired access. | 2010-06-03 |
20100138909 | VPN AND FIREWALL INTEGRATED SYSTEM - The present disclosure provides an integrated VPN/Firewall system that uses both hardware (firmware) and software to optimize the efficiency of both VPN and firewall functions. The hardware portions of the VPN and firewall are designed in flexible and scalable layers to permit high-speed processing without sacrificing system security. The software portions are configured to provide interfacing with hardware components, report and rules management control. | 2010-06-03 |
20100138910 | METHODS FOR ENCRYPTED-TRAFFIC URL FILTERING USING ADDRESS-MAPPING INTERCEPTION - The present invention discloses methods, media, and perimeter gateways for encrypted-traffic URL filtering using address-mapping interception, methods including the steps of: providing a client system having a client application for accessing websites from web servers; upon the client application attempting to access an encrypted website, performing a name-to-address query to resolve a name of the encrypted website; intercepting address-mapping responses; creating a mapping between the name and at least one network address of the encrypted website; intercepting incoming encrypted traffic; extracting a server's network address from the incoming encrypted traffic; establishing a resolved name being accessed using the mapping; and filtering the resolved name. Preferably, the step of filtering includes redirecting the encrypted traffic. Preferably, the method further includes the step of: blocking all encrypted traffic for unresolved names. | 2010-06-03 |
20100138911 | INTERNET-BASED AUTOMATIC SECURITY SYSTEM AND METHOD - The preset invention provides an Intrnet-based automatic security system and method. The security system includes a network server with a database, a network detection module and an automatic transmitting module, and a security device with a microcontroller, a virtual IP network module and wireless transmission module. The network detection module receives the information of security device and detects the networking state. The automatic transmitting module automatically transmits the alarm information from the network detection module to the client and security operator. The microcontroller links security components. The virtual IP network module employs a virtual IP address and links to a virtual IP router through a transmission interface. The security device also contains a polling module automatically linked to the network server for reading data. | 2010-06-03 |
20100138912 | System and method for authenticating an end user - A method for authenticating an end user. The method begins by generating a login field in response to receiving an authentication request from an end user. The login field comprises a plurality of colored nodes containing a first subset of nodes matching both color and location to a second subset of nodes residing in a transparent credit card being controlled by the end user. Next the method determines the authenticity status of the end user by comparing data received from the end user with the first subset of nodes. The end user having generated the data by overlaying the transparent credit card on top of the login field and selecting at least one colored node. Each node being selected according to a function utilizing both static and dynamic variables. Finally, the method sends the determined authenticity status to the end user via an output device. | 2010-06-03 |
20100138913 | MESSAGE ADMINISTRATION SYSTEM - Methods and systems for message administration are described. In one embodiment, an application request for an application associated with an administration tool may be accessed. The application request may be associated with a user. The application may be deployed on a system machine. A particular access level of a plurality of access levels may be identified for the user on the administration tool. The particular access level may identify functionality of the administration tool available to the user. A determination of whether to allow processing of the application request based on the particular access level may be made. When the application request meets the particular access level, communication with the system machine from the administration tool may be made based on the application request. The system machine may be capable of processing the application request. Additional methods and systems are disclosed. | 2010-06-03 |
20100138914 | SYSTEM AND METHOD OF PROVIDING BIOMETRIC QUICK LAUNCH - By providing a biometric candidate to a biometric input device, a user may cause a computing device to be unlocked and cause a specific application to be launched on the computing device. The biometric input device may be on the computing device or on a peripheral security device that is in communication with the computing device. Indeed, the specific application may be launched pre-loaded with certain data, selection of which data is controlled by the particular biometric provided to the biometric input device. | 2010-06-03 |
20100138915 | Password Protected Built-In Test Mode For Memories - In accordance with some embodiments, a semiconductor memory may be provided with a built-in test mode that is accessible through a password protection scheme. This enables access to a built-in test mode after manufacturing, if desired. At the same time, the password protection prevents use of the built-in test mode to bypass security features of the memory. | 2010-06-03 |
20100138916 | Apparatus and Method for Secure Administrator Access to Networked Machines - A secure access method includes generating administrator access security information including a public and private key pair. The administrator access security information is associated with a set of client users assigned to a specified group. Each client user has personal security credentials for accessing a client computer. The administrator access security information is copied to a set of security tokens. The security tokens are distributed. A client computer associated with a client user of the set of client users is accessed by utilizing one of the security tokens instead of personal security credentials for the client computer. | 2010-06-03 |
20100138917 | REFRESH MECHANISM FOR RATE-BASED STATISTICS - Rate-based statistics are aperiodically refreshed. For example, for each Internet Protocol address being monitored, a time stamp of the last (most recent) statistics object (e.g., packet) and corresponding rate-based statistics are stored. The time stamp of a new statistics object is compared with the stored time stamp. The stored time stamp may be updated, and the stored statistics may be updated or refreshed, depending on the result of the comparison. | 2010-06-03 |
20100138918 | Keyboard Security Status Check Module and Method - A keyboard security status check module and method are provided. The module is provided to enable a user to easily check the operating status of a keyboard security program installed in a user terminal. The module includes a keyboard security monitor linked to the keyboard security program and configured to monitor a reception status of key input data protected by keyboard security, and a controller configured to display a dynamic keyboard security check representation on a screen of the user terminal according to the reception status of the key input data monitored by the keyboard security monitor. | 2010-06-03 |
20100138919 | SYSTEM AND PROCESS FOR DETECTING ANOMALOUS NETWORK TRAFFIC - A process for detecting anomalous network traffic in a communications network, the process including: generating reference address distribution data representing a statistical distribution of source addresses of packets received over a first time period, the received packets being considered to represent normal network traffic; generating second address distribution data representing a statistical distribution of source addresses of packets received over a second time period; and determining whether the packets received over the second time period represent normal network traffic on the basis of a comparison of the second address distribution data and the reference address distribution data. | 2010-06-03 |
20100138920 | METHOD AND SYSTEM FOR DETECTING AND RESPONDING TO HARMFUL TRAFFIC - There is provided a method and system for detecting and responding to harmful traffic. The system includes a router determining whether or not received data is harmful traffic, by using a dynamic flow identification (DFI) function and a deep packet inspection (DPI) function, sending Cflowd information of the received data, and then encapsulating the received data when the received data is determined to be harmful traffic, a policy & resource control entity receiving the Cflowd information from the router, determining whether or not the received data is harmful traffic by using the received Cflowd information, and then sending a result of the determination to the router, and a security management server receiving the encapsulated data from the router, reconfirming whether or not the encapsulated data is harmful traffic, and then processing the encapsulated data. | 2010-06-03 |
20100138921 | Countering Against Distributed Denial-Of-Service (DDOS) Attack Using Content Delivery Network - Method and apparatus for blocking a distributed denial-of-service (DDoS) attack are provided. It is first determined whether a traffic status of an origin server is based on the DDoS attack. When it is determined that the traffic status of the origin server is based on the DDoS attack, a DNS is requested to change an Internet protocol (IP) address of the origin server to the IP address of at least one of plural servers. Accordingly, it is possible to accept a normal service providing request and also to determined and block the DDoS attack. In addition, since a device for determining and blocking the DDoS attack need not be installed in each site or server, it is possible to efficiently determine and block the DDoS attack at reduced cost. | 2010-06-03 |
20100138922 | Methods, Systems, and Products for Secure Access to File System Structures - Methods, systems, and products are disclosed for securing access to a file system. A directory is established in a hierarchical file structure having access permission defined by a first owner. A subdirectory is established in the directory. A sub-level subdirectory is established in the subdirectory having access permissions defined by a second owner. The subdirectory is publically accessible to anyone satisfying the access permission defined by the first owner, such that a change directory system call is executed for a user in the subdirectory, even though the user has not authenticated the access permission defined by the second owner. | 2010-06-03 |
20100138923 | 3-PRONG SECURITY/RELIABILITY/REAL-TIME DISTRIBUTED ARCHITECTURE OF INFORMATION HANDLING SYSTEM - The present invention is directed to a distributed architecture of an information handling system, including a buried nucleus inaccessible for inspection without heroic means while the buried nucleus is in operation, and a trusted authority for generating a secure protocol. The secure protocol controls the operation of the buried nucleus. | 2010-06-03 |
20100138924 | Accelerating the execution of anti-virus programs in a virtual machine environment - The execution of anti-virus programs can be accelerated in a virtual desktop environment. In one embodiment, a server hosts a plurality of virtual machines. Before performing a virus scan on a file, the server computes a signature value of the file, compares the signature value with the stored signature values in a central database, and performs virus scan on the file according to the result of the comparison. If the signature value exists in the central database, the virus scan on the file can be skipped. | 2010-06-03 |
20100138925 | METHOD AND SYSTEM SIMULATING A HACKING ATTACK ON A NETWORK - The present invention describes a method for simulating a hacking attack on a Network, wherein the Network comprises at least one of a plurality of data processing units (DPUs), a plurality of users and a plurality of communication links, to assess vulnerabilities of the Network. The method includes receiving one or more scan parameters for the Network. Further, the method includes creating at least one master agent by a system to gather information about the Network, wherein the information pertains to critical and non-critical information about the Network. The method includes creating an Information Model and then incrementally updating the Information Model during the hacking attack. The Information Model is the abstract representation of information collected by the system. Furthermore, the method includes generating a Multiple Attack Vector (MAV) graph based on one or more scan parameters and the Information Model. MAV has the ability to combine plurality of low and medium severity vulnerabilities associated with the data processing units (DPUs), users and communication links, correlate vulnerabilities in combination with Information Model and generate high severity attack paths that can lead to compromise of the Network. Moreover, the method includes launching one or more attacks based on the MAV graph to compromise the Network. The method further includes installing at least one slave agent on the compromised Network to perform the one or more attacks in a distributed manner. Moreover, the method includes performing a multi stage attack by using the at least one slave agent and the at least one master agent by repeating above steps. Finally, the method includes generating a report by the scan controller, wherein the report contains details about the compromised Network and the vulnerabilities of the Network. | 2010-06-03 |
20100138926 | SELF-DELEGATING SECURITY ARRANGEMENT FOR PORTABLE INFORMATION DEVICES - A portable information device includes a dynamically configurable security arrangement in which operational settings are automatically and dynamically configured based on a current set of security risks to which the device is exposed, on a current computing capacity of the portable information device, or both. The operational settings can be adjusted to control which security services or functions are to be executed locally by portable information device, and which of the security services or functions are to be executed remotely on at least one computing device that is distinct from the portable information device. | 2010-06-03 |
20100138927 | Apparatus and Method for Preventing Unauthorized Access to Secure Information - A computer readable storage medium includes executable instructions to process a duress command to invoke a system termination operation. The duress command may be a pass phrase with an added prefix or suffix. The duress command may be received from a menu, a dedicated key or a key sequence. The system termination operation may result in whole disk encryption. Alternately, the system termination operation may result in permanent destruction of data. | 2010-06-03 |
20100138928 | APPARATUS AND METHOD FOR SHARING CONTENT BETWEEN DEVICES BY USING DOMAIN DRM - An apparatus for sharing content between devices by using a domain digital rights management (DRM) includes: a domain management unit for performing management of a domain within a specific area and registration of users and user devices; a user management unit for managing information about the users of the domain registered by the domain management unit; and a device management unit for managing domain clients of the domain registered by the domain management unit. The apparatus further includes a DRM management unit that has DRM information that supports the domain created through the domain management unit and update information about each DRM, and relays such that DRM content stored in each domain client is converted into domain DRM content and domain DRM license. | 2010-06-03 |
20100138929 | CONDITIONALLY TRACEABLE ANONYMOUS SERVICE SYSTEM - Conditionally traceable anonymous service system is provided. The system respectively separates subject conforming real name, subject conforming anonymity, subject requesting verification for an anonymity certification means, so that privacy of a user is hardly violated, the present invention can acquire real name information for the user only when a trace for a user is surely requested. | 2010-06-03 |
20100138930 | System and Method of Secure Garbage Collection on a Mobile Device - A method and system for performing garbage collection involving sensitive information on a mobile device. Secure information is received at a mobile device over a wireless network. The sensitive information is extracted from the secure information. A software program operating on the mobile device uses an object to access the sensitive information. Secure garbage collection is performed upon the object after the object becomes unreachable. | 2010-06-03 |
20100138931 | METHOD AND SYSTEM FOR REAL TIME CLASSIFICATION OF EVENTS IN COMPUTER INTEGRITY SYSTEM - Method and system using a designated known secure computer for real time classification of change events in a computer integrity system are disclosed. In the embodiment of the invention, the known secure computer is dedicated for providing permissible change events, which are compared with change events generated on client operational computers. An alert is raised when the change event at the client operational computer and the respective permissible change event provided by the known secure computer differ. | 2010-06-03 |
20100138932 | DATA PROTECTING METHOD AND COMPUTING APPARATUS - A data protecting method, including the steps of: (a) upon receipt of a triggering command, configuring a hardware control module to store data in a hidden zone that is unidentifiable, unreadable and unwritable by an operating system block in communication with the hardware control module; and (b) upon receipt of a restore request command from an input device in direct communication with the hardware control module, configuring the hardware control module to execute the restore request command so as to transfer the data from the hidden zone to a working zone that is identifiable, readable and writable by the operating system block when a predetermined condition is satisfied. | 2010-06-03 |
20100138933 | DATA MANAGEMENT DEVICE, STORED DATA MANAGEMENT METHOD AND COMPUTER PROGRAM - Provided is a data management device for managing data recorded onto a readable and writable recording medium by an application that is verified based on a digital certificate. The recording medium has a plurality of areas and access to each area is restricted to a different application. The data management device includes an application authentication module, a mapping module, and a local storage display module. The application authentication module verifies that an application is an authentic application based on a digital certificate attached to the application. The mapping module associates, if the application is verified, an area accessible by the application with a subject name described in the digital certificate used for the verification. The local storage display module displays information regarding the area accessible by the application, with the use of the subject name associated with the area. | 2010-06-03 |
20100138934 | INFORMATION PROCESSOR - An information processor for controlling a storage device for storing content information, includes: a controller for receiving content information from the exterior and storing the content information in the storage device; and a generator for generating unique information that is unique to combination of the content information and the information processor through an operation of identification information of the content information and the information processor; wherein when the controller receives content information, the controller checks whether the content information includes information matching with the unique information and upon confirmation of both the information allows the content information to be stored in the storage device. | 2010-06-03 |
20100138935 | Detection of cellular stress - We provide reporter gene constructs incorporating nucleic acid sequences from a promoter region of a gene or set of genes whose expression is modified in response to external or internal changes in the cellular environment such as biochemical stress or toxic conditions. The promoters are operatively linked to nucleic acid sequences chosen on the basis of the ease with which their transcription and/or translation products may be assayed so that the reporter gene constructs can provide a system capable of detecting intracellular conditions. Also described are transfected cell lines including the constructs and transgenic non-human animal models including the constructs. | 2010-06-03 |
20100138936 | Transgenic Mice and Use Thereof as an Experimental Model - The invention relates to the use of an expression vector construction coding for the functional HLA-DPal03β401 complex specifically identified by anti-HLA-DP antibodies, in order to create transgenic mice. The invention also relates to the use of the transgenic mice obtained, such as for the comparative preclinical study of the efficacy of vaccine candidates in order to asses the risks associated with the unwanted induction of an autoimmune disease and in order to determine a therapeutic strategy. | 2010-06-03 |
20100138937 | Method for diagnosis of severity and prediction of recurrence in eosinophilic inflammatory disease - A method for diagnosis of the severity of a condition in an eosinophilic inflammatory disease such as nasal polyp or for prediction of the recurrence of the disease, the method comprising detecting H-PGDS induced by eosinophilic leukocytes accumulated in a lesion or determining pGD | 2010-06-03 |
20100138938 | METHOD OF PRODUCING A MULTICHIMERIC MOUSE AND APPLICATIONS TO STUDY THE IMMUNOPATHOGENESIS OF HUMAN TISSUE-SPECIFIC PATHOLOGIES - The invention relates to a method of producing a multichimeric mouse comprising a functional xenogenic (human) immune system restricted to the MHC class I and/or class II molecules (HLA molecules) of the xenogenic species solely, and a functional tissue. The invention relates also th the use of the multichimeric mouse obtainable by said method, to study the immunopathogenesis of tissue-specific diseases (infectious, tumoral or auto-immune pathologies) and to their applications to design and test vaccines or immunotherapeutic agents against these pathologies. | 2010-06-03 |
20100138939 | PIG MODEL FOR ATHEROSCLEROSIS - The present invention relates to a genetically modified pig as a model for studying atherosclerosis. The modified pig model displays one or more phenotypes associated with atherosclerosis. Disclosed is also a modified pig comprising a mutation in the endogenous ApoE gene or part thereof and/or LDL gene or part thereof, and/or LDL receptor gene, and/or transcriptional and/or translational product or part thereof. The invention further relates to methods for producing the modified pig; and methods for evaluating the effect of a therapeutical treatment of atherosclerosis; methods for screening the efficacy of a pharmaceutical composition; and a method for treatment of a human being suffering from atherosclerosis are disclosed. | 2010-06-03 |
20100138940 | TRANSGENIC PIG AS A MODEL OF ALZHEIMER'S DISEASE - The present invention relates to a modified pig as a model for studying Alzheimer's disease. The modified pig model displays one or more phenotypes associated with Alzheimer's disease. Disclosed is also a modified pig comprising a modified human and/or porcine APP gene, and/or PS1 gene, and/or a transcriptional and/or translational product or part thereof. The invention further relates to methods for producing the modified pig; and methods for evaluating the effect of a therapeutical treatment of Alzheimer's disease; methods for screening the efficacy of a pharmaceutical composition; and a method for treatment of a human being suffering from Alzheimer's disease are disclosed. | 2010-06-03 |
20100138941 | METHOD FOR SCREENING IMMUNE MODULATOR - Disclosed is a method for screening an immune modulator. More specifically, disclosed is a method of screening an immune modulator, an anticancer agent and an agent for treating autoimmune diseases, which regulate the cell surface expression level of gp96, using the binding of the region of amino acids 54-192 of AIMP1 to the region of amino acids 699-799 of AIMP1, set forth in SEQ ID NO: 18. Also disclosed is a method of diagnosing autoimmune diseases using the binding. | 2010-06-03 |
20100138942 | USE OF THE AUGMENTER OF LIVER REGENERATION PROTEIN AS AN APOPTOSIS REGULATOR - The invention relates to a new use of the protein called Augmenter of Liver Regeneration (Alrp) in the regulation and control of apoptosis in mammals. | 2010-06-03 |
20100138943 | IDENTIFICATION OF GROUP OF HYPERTENSION-SUSCEPTIBILITY GENES - A genetic marker including a SNP which can be used for assessing the risk of developing hypertension, a polynucleotide for assessing the risk of developing hypertension which can be used as a primer or probe for detecting the genetic marker, a method for assessing the risk of developing hypertension using the SNP, a microarray for assessing the risk of developing hypertension which is used for genotyping of the SNP, a kit used in the method for assessing the risk of developing hypertension, and the like. | 2010-06-03 |
20100138944 | Methods of Reducing Repeat-Induced Silencing of Transgene Expression and Improved Fluorescent Biosensors - Methods of avoiding repeat- and homology-induced silencing of transgenes are disclosed, in which transgene sequences are genetically altered to reduce the affects of gene silencing. FRET biosensors containing such genetic alterations for improved expression in cell lines and in vivo are disclosed. | 2010-06-03 |
20100138945 | HUMANIZED ANTI-IL-6 ANTIBODIES - The present invention relates to novel chimeric, humanized or CDR-grafted anti-IL-6 antibodies, including isolated nucleic acids that encode at least one such anti-IL-6 antibody, vectors, host cells, transgenic animals or plants, and methods of making and using thereof, including therapeutic compositions, methods and devices. | 2010-06-03 |
20100138946 | Transgenic chickens with an inactivated endogenous gene locus - The present invention is transgenic chickens obtained from long-term cultures of avian PGCs and techniques to produce and transgenic birds derived from prolonged PGC cultures. In some embodiments, these PGCs can be transfected with genetic constructs to modify the DNA of the PGC, specifically to introduce a transgene encoding an exogenous protein. When combined with a host avian embryo by known procedures, those modified PGCs are transmitted through the germline to yield transgenic offspring. This invention includes compositions comprising long-term cultures of PGCs and offspring derived from them that are genetically modified. The genetic modifications introduced into PGCs to achieve the gene inactivation may also include, but are not restricted to, random integrations of transgenes into the genome, transgenes inserted into the promoter region of genes, transgenes inserted into repetitive elements in the genome, site specific changes to the genome that are introduced using integrase, site specific changes to the genome introduced by homologous recombination, and conditional mutations introduced into the genome by excising DNA that is flanked by lox sites or other sequences that are substrates for site specific recombination. | 2010-06-03 |
20100138947 | Method for Producing Stem Cells or Stel Cell-Like Cells from Mammalian Embryos - The present invention relates to methods and compositions for the production and derivation of pluripotent stem cells from embryos or embryo-derived cells and therapeutic uses therefor. In particular, the present invention relates to a method for producing functional stem cells or stem cell-like cells comprising the steps of culturing an embryo or embryo-derived cells in the presence of a demethylation agent and isolating functional pluripotent cells. | 2010-06-03 |
20100138948 | TRANSGENIC PLANTS WITH CONTROLLED DISTRIBUTION OF A TRAIT TO PROGENY - A process of producing a transgenic multi-cellular plants or parts thereof expressing a trait of interest, said trait having a controlled distribution of said trait to progeny, wherein said process comprises (i) producing a first plant or a cell thereof having in a first locus of a nuclear chromosome a first heterologous nucleotide sequence comprising a first fragment of a nucleotide sequence encoding said trait of interest, (ii) producing a second plant or a cell thereof having in a second locus of a nuclear chromosome homologous to said nuclear chromosome of step (i), a second heterologous nucleotide sequence comprising a second fragment of the nucleotide sequence encoding said trait of interest, and (iii) hybridising said first and said second plant or cells thereof to generate progeny exhibiting said functional trait of interest due to binding between a protein or polypeptide encoded by said first heterologous nucleotide sequence and a protein or polypeptide encoded by said second heterologous nucleotide sequence. Further, the invention provides a process of producing hybrid seeds for agriculture. | 2010-06-03 |
20100138949 | TOBACCO CULTIVAR AOB 171 - The present invention relates to a novel tobacco cultivar designated AOB 171, which has low to intermediate nicotine content. The invention provides seeds of the cultivar AOB 171, plants and parts thereof of the cultivar AOB 171, a tissue culture derived from the cultivar AOB 171, hybrids produced from cultivar AOB 171 and lines derived from cultivar AOB 171, as well as genetically modified forms of the foregoing plants and tissue culture. Also provided are methods of producing cultivar AOB 171 plants, cultivar AOB 171 hybrid plants, and tobacco lines derived from cultivar AOB 171. In addition, products produced from the plants of the present invention are provided. | 2010-06-03 |
20100138950 | NOVEL MAIZE PLANT - The present invention relates to maize plants with a genome comprising a unique allele profile associated with the corresponding QTLs contributing to the expression of a variety of phenotypic traits of economic interest selected from the group of grain yield, grain moisture at harvest, early and late root lodging, stalk lodging, common smut incidence, fusarium ear rot incidence, sulcotrione resistance, and tassel architecture. | 2010-06-03 |
20100138951 | Methods of producing haploid and doubled haploid oil palms - The present invention relates to haploid oil palm plants and homozygous doubled haploid oil palm plants. The invention also relates to methods for producing and selecting haploid and doubled haploid plants. More particularly, but not exclusively, the method may be used for selecting haploid and doubled haploid oil palm plants. Haploid and doubled haploid plants are selected by a large-scale screening based on a combination of the phenotype with the use of molecular methods combined with flow cytometry techniques to identify haploid and doubled haploid plants. More particularly, a method for selecting haploid and doubled haploid plants is described comprising: (a) germinating seeds; (b) selecting seedlings with atypical phenotype; (c) assessing heterozygosity using markers; (d) isolating cells from the seedlings and determining the DNA content of the cells; and (e) isolating and purifying the DNA and using defined molecular markers to characterise the genotype of the plant. The haploid oil palm plants may be used for producing homozygous doubled haploid oil palms: doubled haploids may be intercrossed to produce uniform F | 2010-06-03 |
20100138952 | GENE PROMOTER REGULATORY ELEMENT ANALYSIS COMPUTATIONAL METHODS AND THEIR USE IN TRANSGENIC APPLICATIONS - A computer-assisted method of identifying regulatory elements includes receiving a first orthologous species sequence, receiving a word length, receiving a relative offset, and receiving at least one additional orthologous species sequences, wherein each of the orthologous species sequences is associated with a species, and each of the species is an orthologous species. The method further includes performing a pairwise comparison between each pair of orthologous species sequences, computing using a computing device, overlapping portions of the sequence overlapping the sequences of all of the orthologous species sequences within the relative offset and greater than or equal to the word length. | 2010-06-03 |
20100138953 | Methods for using artificial polynucleotides and compositions thereof to reduce transgene silencing - The materials and methods disclosed provide for polynucleotide molecules sufficiently divergent from polynucleotides naturally contained in plants, or polynucleotides previously introduced into plants as transgenes to permit trait stacking in plant breeding methods or plant transformation methods. The disclosure also provides for methods and compositions to detect the polynucleotides of the invention in plants. | 2010-06-03 |
20100138954 | Genes Encoding Z,Z-Farnesyl Diphosphate Synthase and A Sesquiterpene Synthase with Multiple Products and Uses Thereof - The present invention relates to the genes involved in the biosynthetic pathway for sesquiterpenes of SB type (alpha-santalene, epi-beta-santalene, cis-alpha-bergamotene, trans-alpha-bergamotene and endo-beta-bergamotene,) and for the precursor thereof, Z,Z-farnesyl diphosphate (Z,Z-FPP), involving a Z,Z-FPP synthase and a sesquiterpene SB synthase, and to the uses thereof for producing sesquiterpeniques compounds of SB type. | 2010-06-03 |
20100138955 | EPIDERMAL TISSUE PROMOTER DERIVED FROM POTATO FOR MONOCOTS - The presently disclosed subject matter includes nucleic acid sequences and expression cassettes that contain regulatory sequences derived from | 2010-06-03 |
20100138956 | NITROGEN TRANSPORT METABOLISM - This invention relates to an isolated nucleic acid fragments encoding an ammonium transporter. The invention also relates to the construction of a recombinant DNA construct encoding all or a portion of ammonium transporters, in sense or antisense orientation, wherein expression of the recombinant DNA construct may alter levels of the ammonium transporter in a transformed host cell. | 2010-06-03 |
20100138957 | HYBRID PEPTIDES HAVING ANTIMICROBIAL ACTIVITY AND METHODS OF MAKING AND USING HYBRID PEPTIDES - The present invention concerns the development and utilization of hybrid lytic peptides derived from non-venomous molecular sources to confer a high level of sustainable resistance to phytopathogens in transgenic plants. In an exemplified embodiment, a composition of the invention comprises a cecropin-pleurocidin hybrid peptide of 27 amino acids. The peptide was designed based on optimization of critical molecular and physiochemical parameters. Peptides of the invention offer significantly enhanced antimicrobial activity and molecular properties associated with low cytotoxicity. Transgenic plants of grapevine ( | 2010-06-03 |
20100138958 | Plant Responses - The present invention relates to methods and uses for improving traits in plants which are important in the field of agriculture. In particular, the methods and uses of the invention use a plant Hsf to increase plant productivity, water use efficiency, drought or pathogen resistance. | 2010-06-03 |
20100138959 | Method of Fabricating Bioinsecticide Obtained from Mammalian Galectin - A bioinsecticide is fabricated. Galectin widely found in mammalian is used for the fabrication. The bioinsecticide thus fabricated targets on chitin of peritrophic membrane in intestinal tract for killing insect. The bioinsecticide can be easily decomposed. The present invention is highly safe; is environment protected; and can be widely applied. | 2010-06-03 |
20100138960 | Nucleic Acids Encoding Anthelmintic Agents And Plants Made Therefrom - The present invention provides DNA constructs, transgenic plants containing such constructs, and methods of making the plants. The DNA constructs encode a polypeptide that when expressed results in the production of fatty acid compounds having anthelmintic activity. Transgenic plants expressing such a polypeptide can exhibit enhanced resistance to plant parasitic nematodes, particularly when expressed in vegetative tissues. Transgenic plants expressing such a polypeptide can also be useful for non-pesticidal industrial uses. | 2010-06-03 |
20100138961 | AXMI-010, A DELTA-ENDOTOXIN GENE AND METHODS FOR ITS USE - Compositions and methods for conferring pesticidal activity to bacteria, plants, plant cells, tissues and seeds are provided. Compositions comprising a coding sequence for a delta-endotoxin polypeptide are provided. The coding sequences can be used in DNA constructs or expression cassettes for transformation and expression in plants and bacteria. Compositions also comprise transformed bacteria, plants, plant cells, tissues, and seeds. In particular, isolated delta-endotoxin nucleic acid molecules are provided. Additionally, amino acid sequences corresponding to the polynucleotides are encompassed. In particular, the present invention provides for isolated nucleic acid molecules comprising nucleotide sequences encoding the amino acid sequence shown in SEQ ID NO:2, or the nucleotide sequence set forth in SEQ ID NO:1, as well as variants thereof. | 2010-06-03 |
20100138962 | USE OF PLANT CHROMATIN REMODELING GENES FOR MODULATING PLANT ARCHITECTURE AND GROWTH - The present invention relates to the field of transgenic plants having modified growth and to the use of chromatin remodeling genes, in particular | 2010-06-03 |
20100138963 | DNA Molecules from Maize and Methods of Use Thereof - The present invention relates to DNA polynucleotides for regulating gene expression in plants. In particular, the invention relates to 5′ regulatory sequences isolated from | 2010-06-03 |
20100138964 | PROBES FOR ENHANCED MAGNETIC FORCE MICROSCOPY RESOLUTION - Magnetic Force Microscopy (MFM) probe tips that provide enhanced spatial resolution and methods of manufacture are provided. In one aspect, two or more magnetically-decoupled layers may be deposited on an AFM probe in order to create an active magnetic region at about the apex of the probe tip with dimensions less than about 10 nanometers. In another aspect, nanoscale patterning techniques may be employed to fabricate probe tips that possess plateau features. These plateau features may serve as substrates for the deposition of magnetic films having properties similar to magnetic recording media. Machining techniques, such as Focused Ion Beam (FIB) may be further employed to reduce the size of the magnetic materials deposited upon the substrate. Beneficially, because the plateaus of the substrate are substantially flat and of known geometry, and the magnetic properties of magnetic films deposited on flat surfaces are similar to those deposited upon the plateau, the magnetization of the MFM probe tips may be determined to high accuracy. In this manner, fine control over the magnetic properties of MFM probe tips may be achieved, providing enhanced MFM resolution. | 2010-06-03 |
20100138965 | Blueberry variety named 'Blue Moon' - A new and distinct Northern Highbush blueberry variety is described. The variety results from selection among a population of seedlings derived from crossing the blueberry variety known as ‘Nui’ (U.S. Plant Pat. No. 6,699) and an unnamed seedling selection called B7.8.1 (not patented). The fruit of this new variety is large, with an attractive appearance characterised by good bloom and good firmness; fruit has an outstanding fruit quality with sweet and aromatic flavour. Mature plant is upright while the young plant is semi-upright with medium to good vigour. The new variety has been named ‘Blue Moon’. | 2010-06-03 |
20100138966 | Strawberry plant named "Viva Patricia" - This invention relates to a new and distinctive short-day cultivar, designated as ‘Viva Patricia’, primarily adapted to the growing conditions in Spain. This short-day (Mediterranean) cultivar is primarily characterized by an upright and dense growth habit, a large fruit size having superior uniformity, a primarily conical shaped berry exhibiting a glossy bright red appearance, a significantly better flavored and aromatic berry providing a more pleasant eating experience, a firmer fruit skin, an increased number of flowers and fruits per truss, a very moderate petiole pubescence, and an early to mid-season production with substantial yields and excellent commercial ratings. | 2010-06-03 |
20100138967 | Hydrangea Plant named "Dove" - A new and distinct cultivar of | 2010-06-03 |
20100138968 | Erysimum plant named 'Sapery' - A new cultivar of | 2010-06-03 |
20100138969 | Ornithogalum plant named 'Bethlehem' - A new and distinct cultivar of | 2010-06-03 |
20100138970 | Ornithogalum plant named 'Damascus' - A new and distinct cultivar of | 2010-06-03 |