30th week of 2011 patent applcation highlights part 59 |
Patent application number | Title | Published |
20110185354 | Mobile Application Delivery Management System - A computer implemented method and system is provided for managing delivery of mobile applications to a user's mobile device. A distribution server in communication with a transaction management server via a network is provided. The distribution server acquires identification information of the user's mobile device and one or more mobile applications. The distribution server determines the mobile device's network service information and characteristic information based on the identification information. The transaction management server initiates a mobile application delivery transaction based on the network service information and the characteristic information for generating a reference pointer for each of the mobile applications. The distribution server delivers the reference pointer to the mobile device based on the network service information and/or characteristic information. The reference pointer enables the user to perform actions associated with the mobile applications, which are tracked and analyzed for initiating marketing by a partner server via a marketing server. | 2011-07-28 |
20110185355 | Accessing Virtual Disk Content of a Virtual Machine Without Running a Virtual Desktop - Methods, systems, and techniques for facilitating access to content stored remotely, for example, as part of a virtual machine infrastructure or elsewhere in a networked environment, using a uniform mechanism are provided. Example embodiments provide an Enhanced Virtual Desktop Management Server/System with a Content Abstraction Layer which enables users to access their data stored as part of a virtual machine environment, or replicated otherwise on a network, using a generic API. The API can be incorporated into a web browser or other third party interface to provide access to the users' data without needing to remote a bitmap representation of a virtual desktop display. Accordingly, users can access their data, applications, and settings regardless of the type of access device and regardless of whether the corresponding virtual desktop is running in the data center, provisioned in the datacenter but running on a client device, or not running at all. | 2011-07-28 |
20110185356 | System and Method to Enable Power Related Decisions in a Virtualization Environment - A virtualization system includes an information handling system with a power detector that detects a power level of the information handling system and another power detector that detects another power level of the information handling system, a power status module, and a virtual machine manager that starts workloads on the information handling system. The power status module receives the power levels and sends the power levels to the virtual machine manager. The virtual machine manager apportions a first portion of the first power level to the first workload, apportions a second portion of the first power level to the second workload, apportions a first portion of the second power level to the first workload, and apportions a second portion of the second power level to the second workload. | 2011-07-28 |
20110185357 | Method and Apparatus for Management Between Virtualized Machines and Virtualized Storage Systems - To manage physical paths between a server system and a storage system and information about routing between virtual machines and virtual storage systems in an integrated fashion. A computer system of the present invention includes: a computer and a storage system that stores data, in which the computer includes first information for managing the first resource relating to the computer; and the storage system includes second information for managing the second resource provided in the storage system, and in which a relation between the virtual machine and the virtual storage system is defined based on the first information and the second information. | 2011-07-28 |
20110185358 | PARALLEL QUERY ENGINE WITH DYNAMIC NUMBER OF WORKERS - Partitioning query execution work of a sequence including a plurality of elements. A method includes a worker core requesting work from a work queue. In response, the worker core receives a task from the work queue. The task is a replicable sequence-processing task including two distinct steps: scheduling a copy of the task on the scheduler queue and processing a sequence. The worker core processes the task by: creating a replica of the task and placing the replica of the task on the work queue, and beginning processing the sequence. The acts are repeated for one or more additional worker cores, where receiving a task from the work queue is performed by receiving one or more replicas of tasks placed on the task queue by earlier performances of creating a replica of the task and placing the replica of the task on the work queue by a different worker core. | 2011-07-28 |
20110185359 | Determining A Conflict in Accessing Shared Resources Using a Reduced Number of Cycles - Illustrated is a system and method for identifying a potential conflict, using a conflict determination engine, between a first transaction and a second transaction stored in a conflict hash map, the potential conflict based upon a potential accessing of a shared resource common to both the first transaction and the second transaction. The system and method further includes determining an actual conflict, using the conflict determination engine to access the combination of the conflict hash map and the read set hash map, between the first transaction and the second transaction, where a time stamp value of only selected shared locations has changed relative to a previous time stamp value, the time stamp value stored in the read set hash map and accessed using the first transaction. | 2011-07-28 |
20110185360 | MULTIPROCESSING TRANSACTION RECOVERY MANAGER - A multiprocessing transaction recovery manager, operable with a transactional application manager and a resource manager, comprises a threadsafety indicator for receiving and storing positive and non-positive threadsafety data of at least one transactional component managed by one of the transactional application manager and the resource manager; a commit protocol component for performing commit processing for the at least one transactional component; and a thread selector responsive to positive threadsafety data for selecting a single thread for the commit processing to be performed by the commit protocol component. The thread selector is further operable to select plural threads for the commit processing to be performed by the commit protocol component responsive to non-positive threadsafety data. | 2011-07-28 |
20110185361 | Interdependent Task Management - An illustrative embodiment of a computer-implemented process for interdependent task management selects a task from an execution task dependency chain to form a selected task, wherein a type selected from a set of types including “forAll,” “runOnce” and none is associated with the selected task and determines whether there is a “forAll” task. Responsive to a determination that there is no “forAll” task, determines whether there is a “runOnce” task and responsive to a determination that there is a “runOnce” task further determines whether there is a semaphore for the selected task. Responsive to a determination that there is a semaphore for the selected task, the computer-implemented process determines whether the semaphore is “on” for the selected task and responsive to a determination that the semaphore is “on,” sets the semaphore “off” and executes the selected task. | 2011-07-28 |
20110185362 | System and method for integrating software schedulers and hardware interupts for a deterministic system - The problem which is being addressed by this invention is the lack of determinism in mass market operating systems. This invention provides a mechanism for mass market operating systems running on mass market hardware to be extended to create a true deterministic responsive environment. | 2011-07-28 |
20110185363 | TASK SWITCHING APPARATUS, METHOD AND PROGRAM - A method of assigning task management blocks for first type tasks to time slot information on a one-by-one basis, assigning a plurality of task management blocks for second type tasks to time slot information, selecting a task management block according to a priority classification when switching to the time slot of the time slot information, and switching to the time slot except the time slot information. Additionally a task switching apparatus selects the task management block assigned to the time slot and executes the task. | 2011-07-28 |
20110185364 | EFFICIENT UTILIZATION OF IDLE RESOURCES IN A RESOURCE MANAGER - Embodiments are directed to dynamically allocating processing resources among a plurality of resource schedulers. A resource manager dynamically allocates resources to a first resource scheduler. The resource manager is configured to dynamically allocate resources among a plurality of resource schedulers, and each scheduler is configured to manage various processing resources. The resource manager determines that at least one of the processing resources dynamically allocated to the first resource scheduler is idle. The resource manager determines that at least one other resource scheduler needs additional processing resources and, based on the determination, loans the determined idle processing resource of the first resource scheduler to a second resource scheduler. | 2011-07-28 |
20110185365 | DATA PROCESSING SYSTEM, METHOD FOR PROCESSING DATA AND COMPUTER PROGRAM PRODUCT - A computer-implemented data processing system, computer-implemented method and computer program product for processing data. The system includes: a scheduler; a processor system; and at least one producer for executing a task. The scheduler is operable to allocate to the producer with respect to a scheme, a processing time of a processing resource of the processor system. The producer is operable to execute the task using said processor system during the allocated processing time. | 2011-07-28 |
20110185366 | Load-balancing of processes based on inertia - A process is selected for movement from a current node to a new node, based on an inertia of the process. The inertia is a quantified measure of the impact resulting from the process being inaccessible while being moved. The inertia can take into account the number of current external connections to the process; the larger the number of current external connections is, the greater the inertia. The inertia can take into account the extent to which the process accepts external connections; the greater the extent to which the process accepts external connections is, the greater the inertia. The inertia can take into account the desired availability of the process; the greater the desired availability is, the greater the inertia. The inertia can take into account a specified quality of service of the process; the higher the specified quality of service is, the greater the inertia. | 2011-07-28 |
20110185367 | Implementing request/reply programming semantics using publish/subscribe middleware - A request/reply middleware wrapper that transposes an application's request/reply communications into publish/subscribe communications implemented by publish/subscribe middleware where every distributed application component of a distributed application is referenced by a component type and name. Each component type has associated with it a request publish/subscribe topic and a reply publish/subscribe topic. Each distributed application component subscribes to its request and reply topics and can publish to request and reply topics of other component types. By utilizing callback objects, the middleware wrapper facilitates the transmission of a request and replies between distributed application components by posting the requests or replies on an appropriate request or reply publish/subscribe topic. | 2011-07-28 |
20110185368 | System and Method for Routing Information - In one example, a process manager is configured to receive events created by elements from other parts of enterprise software and to route the events to listeners within the enterprise software, and an evaluator is queried by the process manager and configured to determine the relationships between the event and the listeners in the enterprise software. In some embodiments, new listeners are added to the enterprise software without a significant change to the process manager. | 2011-07-28 |
20110185369 | REFRESH OF AUXILIARY DISPLAY - A system includes an information processing apparatus and a display. The apparatus has at least one processor coupled via a bus to a memory, the processor being programmed to control one or more of a content generation unit to generate content for display, wherein the content includes a page having a plurality of content elements, an ID generating unit to generate content IDs corresponding to each of the content elements in the generated page, a content refresh determination unit to determine a content ID of at least one content element to be refreshed on the display, and a device driver to receive the generated content and transmit instructions to the display to cause display of the content. The device driver receives the content ID for the at least one content element to be refreshed, and transmits instructions to cause refresh of the at least one content element corresponding to the content ID at the identified page location. | 2011-07-28 |
20110185370 | Method and System for Configuring a Plurality of Network Interfaces That Share a Physical Interface - Certain aspects of a method and system for configuring a plurality of network interfaces that share a physical interface (PHY) may include a system comprising one or more physical network interface controllers (NICs) and two or more virtual NICs. One or more drivers associated with each of the virtual NICs that share one or more Ethernet ports associated with the physical NICs may be synchronized based on controlling one or more parameters associated with one or more Ethernet ports. One or more wake on LAN (WoL) patterns associated with each of the drivers may be detected at one or more Ethernet ports. A wake up signal may be communicated to one or more drivers associated with the detected WoL patterns. One of the drivers may be appointed to be a port master driver. If a failure of the appointed port master driver is detected, another driver may be appointed to be the port master driver. | 2011-07-28 |
20110185371 | Systems and Methods for Communicating With Motion Control Systems and Devices - A system for communicating with a motion control system, comprising a set of motion operations, a set of functions, a set of security levels, and client software. The functions are capable of causing the motion control system to perform at least one motion operation. The client software is capable of calling at least one of the functions. The ability of the client software to call at least one of the functions is restricted based on at least one of the security levels. | 2011-07-28 |
20110185372 | OPTICAL DISC DEVICE - A housing included in an optical disc device | 2011-07-28 |
20110185373 | OPTICAL DISC DEVICE - An optical disc device prevents a rail guide from falling off from a bottom case when a housing receives an impact force. The bottom case | 2011-07-28 |
20110185374 | DISC LOADING AND EJECTING STRUCTURE FOR SLOT-IN OPTICAL DISC DRIVES - A disc loading and ejecting structure for a slot-in optical disc drive aims to drive a compact disc into and out of the slot-in optical disc drive to solve the problems of conventional techniques that they are bulky and occupy too much space. The structure includes a driving portion and a guiding portion that are located at two opposite sides of the slot-in optical disc drive. The driving portion includes a roller with the rotation axis parallel with a positioning surface of the compact disc. A first end edge of the compact disc is abutted on the guiding portion and a second end edge is leaned on the roller. The roller can rotate and move reciprocally in parallel with the direction of the rotation axis to drive the compact disc into and out of the slot-in optical disc drive. | 2011-07-28 |
20110185375 | OBJECTIVE LENS DRIVING APPARATUS, OPTICAL PICKUP - High-performance and reliable objective lens driving apparatus and optical pickup wherein the tilt of an objective lens relative to an optical disc is suppressed are provided. The optical pickup is equipped with a semiconductor laser, an electro-optic component, and the objective lens driving apparatus. In this optical pickup, the objective lens driving apparatus is comprised of: a moving part including an objective lens, a holder that holds the objective lens, a focusing coil, and a tracking coil; a holding member for elastic support members that couples together multiple elastic support members providing elastic support on a fixed part and the moving part and is mounted on the moving part; the elastic support members that elastically support the moving part from the fixed part; and the fixed part. The holding member for elastic support members mounted on the moving part and the holder that holds the objective lens are joined together by fitting together a concavity and a convexity. | 2011-07-28 |
20110185376 | OPTICAL DISC FIXING DEVICE AND OPTICAL DISC DRIVE USING SAME - An optical disc fixing device and an optical disc drive using the optical disc fixing device are provided. The optical disc fixing device is configured for fixing an optical disc thereto. The optical disc defines a circular mounting hole at the center portion. The optical disc fixing device includes a cylindrical clamping chassis, at least one latching piece, at least one elastic member, and a control member. The clamping chassis is substantially the same shape as the mounting hole of the optical disc and has a peripheral sidewall. The at least one latching piece together with the at least one elastic member are assembled within the clamping chassis. The control member is releasably assembled to the clamping chassis for extending the at least one latching piece from the peripheral sidewall of the clamping chassis to hold the optical disc. | 2011-07-28 |
20110185377 | METHOD FOR ACCESSING A SERVICE OFFERED FROM A TOKEN, CORRESPONDING TOKEN AND SYSTEM - The invention relates to a method for accessing a service offered from a token. The token is coupled with a terminal. The terminal is capable of receiving broadcast messages. The messages are broadcasted from at least one server. According to the invention, the server sends, through the terminal, within the broadcast messages, at least one piece of data intended for the token and executable by the token. The token executes the executable data by triggering an execution of an application embedded at least in part within the token. The invention relates also to a corresponding token and system. | 2011-07-28 |
20110185378 | Systems For Rich Media Channel Distribution - A media distribution system is presented. A channel producer can access a channel distribution portal to construct one or more channels of rich media content. Channels are defined by one or more media arrangement requirements including a schedule for presenting content, placement of content, orientation of content, layers of content, or other requirements. The arrangement can be compiled into media player commands, which can be sent to subscribing media players. The media players present the channel content according to the compiled arrangement in a manner where each media player presents the channel content substantially at the same time. The system can be used to simulate a shared television viewing experience among cell phone users. | 2011-07-28 |
20110185379 | Content reproduction system and content reproduction method - Provided is a content reproduction system including a content reproduction apparatus including a first receiving unit receiving a request for a list of reproducible content and a content reproduction request, each transmitted from an information processing apparatus, a confirmation unit confirming predetermined information attached to the request for a content-list having received by the first receiving unit, a generation unit generating a content-list to be transmitted to the information processing apparatus, based on confirmation-results by the confirmation unit, and a first transmitting unit transmitting the content-list generated by the generation unit to the information processing apparatus, and the information processing apparatus including a second transmitting unit transmitting a request for a list of reproducible content and a content reproduction request to the content reproduction apparatus, a second receiving unit receiving a content-list transmitted from the content reproduction apparatus, and a display unit displaying the content-list received by the receiving unit. | 2011-07-28 |
20110185380 | Secure Distribution of Video On-Demand - An interactive information distribution system for providing secure distribution of video-on-demand content. The interactive information distribution system includes at least one programming source for storing at least one partially encrypted video program, and a distribution center including a remote server. The remote server stores the at least one partially encrypted video program received from the at least one programming source. The remote server also processes the partially encrypted video program corresponding to a subscriber requested video program to produce a fully encrypted video program. A subscriber-side distribution network, coupled to the distribution center, causes transmission of the fully encrypted video program to the requesting subscriber. | 2011-07-28 |
20110185381 | System and Method for Matching Targeted Advertisements for Video Content Delivery - In accordance with an embodiment, a method of matching video content to advertising content includes electronically receiving a video content metadata from a content provider, and matching the video content metadata to advertising content metadata of a global list of advertisements. The video content metadata corresponds to video content being sent to a user device and includes at least one keyword. Furthermore, the advertising content metadata corresponds to advertising content and includes at least one keyword. Matching the video content metadata to advertising content metadata includes comparing the at least one keyword of the video content metadata to the at least one keyword of the advertising content metadata. | 2011-07-28 |
20110185382 | GENERATING REACH AND FREQUENCY DATA FOR TELEVISION ADVERTISEMENTS - Television reporting records are accessed and processed to generate frequency specific reach values and device frequencies for creatives (e.g., television advertisements). The device frequencies indicating the number of times a creative was presented by use of a particular viewing device. The frequency specific reach values indicating the number of unique viewing devices that were used to present the creative a specified number of times. Estimating frequency specific reach values and device frequencies for a creative for a viewing population. The estimated frequency specific reach values and device frequencies for the viewing population are based on known viewing pattern data for multiple creative airings from a sample of the viewing population (e.g., a subset of the viewing population) and estimated viewing pattern data for the airings for the viewing population. | 2011-07-28 |
20110185383 | Enhanced Interactive Television - Interactive programming advertising methods and systems are provided. A selectable menu may be provided with a broadcast programming advertisement. The selectable menu may include one or more selectable functions that may allow for a user to interact with the broadcast programming advertisement. Data regarding the user's interaction or non-interaction with the interactive programming advertisement may be collected and utilized for providing a user with a more customized television viewing experience, for targeted programming advertisements, for measurement of new viewer generation data, as well as for other marketing activities directed to the user. | 2011-07-28 |
20110185384 | System and Method for Targeted Advertisements for Video Content Delivery - In accordance with an embodiment, a method of inserting advertisements into video content includes electronically receiving video content metadata from a content provider, matching the video content metadata to advertising content metadata to provide a first list of advertisements, filtering the first list of advertisements according to user preference data to determine a second list of advertisements, and transmitting the second list of advertisements to a user device for insertion into the video content. The video content metadata corresponds to video content being sent to a user device, and the advertising content metadata corresponds to advertising content. | 2011-07-28 |
20110185385 | METHOD FOR DISPLAYING EPG INFORMATION INCLUDING BUDDY INFORMATION AND RECEIVER APPLYING THE SAME - A method for displaying Electronic Program Guide (EPG) information and a receiving apparatus where the receiving apparatus displays buddy information on an EPG screen, for displaying EPG information, allowing a user to easily identify which programs his or her friends registered in a buddy list, are watching. | 2011-07-28 |
20110185386 | METHOD AND SYSTEM FOR DISPLAYING ADVERTISING, VIDEO, AND PROGRAM SCHEDULE LISTING - A television schedule system and method for displaying television schedule information on a television screen includes a program guide having a schedule information area that depicts the programs that are being presented on each channel at each time during the day. An input device allows the viewer to browse through the schedule information area and/or obtain more information about programs of particular interest. In one aspect, the viewer may watch a program on the currently-tuned channel, while browsing through the other channels on a portion of the television screen. In another aspect, the viewer may watch programs currently being shown on the television, while he or she browses through the program guide. In yet another aspect, the system includes a database, a processor and associated software for automatically customizing the television schedule guide to an individual viewer or a group of viewers, e.g., a family, to facilitate use of the television schedule. | 2011-07-28 |
20110185387 | SYSTEMS AND METHODS FOR CONTEXTUALLY LINKING TELEVISION PROGRAM INFORMATION - The present invention provides systems and methods for providing television schedule information to a viewer, and for allowing the viewer to link, search, select and interact with information in a remote database, e.g., a database on the internet. The television schedule information can be displayed on a variety of viewer interfaces, such as televisions screens, computer monitors, PCTV screens and the like. The television schedule information may be stored on the viewer's computer, television, PCTV, or a remote server (e.g., a website), or the television schedule information may be downloaded from a remote database to the viewer's computer, television or PCTV. | 2011-07-28 |
20110185388 | APPARATUS AND METHODS FOR PRIORITIZING CONTENT RECEPTION IN A DIGITAL VIDEO RECORDER - Various embodiments described herein provide techniques for prioritizing content reception by a DVR. A DVR identifies a resource conflict between a use of a television receiving resource to receive programming currently being watched by a user and a use of the television receiving resource for receiving television programming for subsequent playback. The DVR evaluates various criteria regarding one or both uses of the television receiving resource and identifies a higher priority of one of the uses of the television receiving resource. The DVR then assigns a use of the television receiving resource according to the identified priority. | 2011-07-28 |
20110185389 | AUDIO VIDEO DISTRIBUTION SYSTEM USING MULTIPLE NETWORK SPEAKER NODES IN A MULTI SPEAKER SESSION - This disclosure describes an audio video distribution system that uses a local area network to distribute a digital audio signal and that uses multiple network speaker nodes to broadcast the digital audio in a multi speaker session. The system includes a local area network that distributes the digital audio signal for the audio video distribution system. In addition, the system includes a first network speaker node participating in a multi speaker session and performing in a master mode, and where the first network speaker node calculates, originates, and controls a distributed multi session clock that is distributed over the network. The system further includes one or more additional network speaker nodes participating in the multi speaker session and perform in a slave mode, and where the additional network speaker nodes receive the distributed multi session clock from the first speaker node. | 2011-07-28 |
20110185390 | MOBILE PHONE INTEGRATION INTO DRIVER INFORMATION SYSTEMS - A method of operating a driver information system includes communicatively coupling a personal electronics device to the driver information system. A selection of an application of the driver information system is received from a user. The user makes input using the car's input devices, and the input is transformed to match the input capabilities of the personal electronics device. Data is transmitted from the application to the personal electronics device. The data is processed within the personal electronics device. A result of the processing is transmitted from the personal electronics device to the driver information system. Information is presented to the user via the driver information system dependent upon the result of the processing. | 2011-07-28 |
20110185391 | SYSTEMS AND METHODS FOR CONNECTING NETWORKED DEVICES - Systems and methods that facilitate the selection and connection of sub-devices managed by virtual device or logical units (LUs) within a network. In one exemplary embodiment, LU connections are preferably brought to the IP layer using HTTP commands and responses. These IP layer commands are used to communicate connection information among the LUs involved in the connection and to allow for LUs to determine which sub-devices within the LU will be used in a connection. When the specific details have been determined, the sink device will work at the network specific level to make the actual connection. This allows for the connections between LUs to be network independent until all of the specific details of the connection have been determined. After that, a connection is established using network specific commands and protocols. | 2011-07-28 |
20110185392 | INTERACTIVE MEDIA GUIDANCE SYSTEM HAVING MULTIPLE DEVICES - When selecting a television program for recording, a user may configure the delivery of the selected television program and associated data and interactive applications to different user equipment devices in a home network, which may have different capabilities. Because the user equipment devices in the home network may have different capabilities, the user may wish to deliver different types and amount of content, different amounts of data, and different versions of interactive applications to the user equipment devices in the home network. | 2011-07-28 |
20110185393 | FAST-START STREAMING AND BUFFERING OF STREAMING CONTENT FOR PERSONAL MEDIA PLAYER - Systems and methods allow playback of a media stream received via a network. The media stream is received and stored in a buffer prior to playback. Responsive to receiving the user command to change the content of the media stream, the buffer is flushed prior to receiving the changed content in the media stream. | 2011-07-28 |
20110185394 | METHOD OF CATV CABLE SAME-FREQUENCY TIME DIVISION DUPLEX DATA TRANSMISSION - Method of bidirectional Time Division Duplex (TDD) data transmission over the same RF frequency ranges of a CATV cable system. The system's slave modem clocks are time synchronized to the master clock of a master modem. The master-to-slave signal propagation times are determined and used to precisely schedule transmissions with de-minimis guard times. The frequency range may be chosen to be in the high frequency CATV range around 1 GHz to maximize backward compatibility with legacy systems, and this frequency may in turn be subdivided into multiple frequencies. In some embodiments, the CATV cable tree may be further partitioned into multiple TDD domains, and multiple local master modems, connected by a special-use optical fiber, may communicate with multiple local slave modems. The system may use MAP allocation schemes that may frequently reallocate TDD time slots and frequencies according to current or projected slave modem data needs. | 2011-07-28 |
20110185395 | COMPUTER READABLE MEDIUM FOR ACCESS RIGHT MANAGEMENT, ACCESS RIGHT MANAGEMENT APPARATUS AND DATA PROCESSING SYSTEM - A non-transitory computer readable medium for an access right management includes: reading correspondence information from a storage unit for storing correspondence information indicating the correspondence between (i) a unique access right of an access right in a data management unit for managing electronic data and the access right to the electronic data and (ii) a common access right of an access right in an interface providing unit intervening between an operation main body for giving an operation command to the electronic data and the data management unit; accepting a setting request for requesting setting of the common access right; and determining whether or not the setting request of the common access right accepted by the accepting is a non-match request. | 2011-07-28 |
20110185396 | INFORMATION-PROCESSING APPARATUS, INFORMATION-PROCESSING METHOD, AND COMPUTER-READABLE STORAGE MEDIUM - An information-processing apparatus comprises: an environment storage unit that stores a set of instructions for implementing a plurality of runtime environments including a first runtime environment and a second runtime environment; an execution unit that executes the set of instructions stored in the environment storage unit; a status-holding unit that stores an item(s) of status information to be transmitted from the first runtime environment to the second runtime environment; a timing storage unit that stores a condition relating to a status of execution of one of the first runtime environment and the second runtime environment; and a transmission unit that transmits the item(s) of status information stored in the status-holding unit to the second runtime environment in a case where the condition stored in the timing storage unit is fulfilled. | 2011-07-28 |
20110185397 | Method And Apparatus For Securing Wireless Relay Nodes - In order to mitigate the security risk posed by the insertion of a relay node within a communication network, both device authentication and subscriber authentication are performed on the relay node. Device and subscriber authentication may be bound together so that a relay node is granted access to operate within the network only if both device and subscriber authentication are successful. Additionally, a communication network (or authentication node) may further verify that a subscriber identifier (received as part of subscriber authentication) is associated with the corresponding device type (identified by the device identifier in the corresponding device authentication) as part of the subscriber authentication process. | 2011-07-28 |
20110185398 | ACCESS CONTROL SYSTEM AND ACCESS CONTROL METHOD - A system including a providing unit that provides a virtual-desktop-service selected on the basis of an identification information acquired from the terminal apparatus, and sends a message that includes an address of the providing unit and an address of an application program booted by a process of the virtual-desktop-service, a storage unit that stores the identification information associated with the address of the providing unit and an access control information associated with a set of a identification information and an address of an application program, and a relay unit that receives a message sent by the providing unit, acquires an identification information associated with a source address included in the received message, acquires an access control information associated with a set of the acquired identification information and a destination address included in the received message, and controls relaying the message depending on the acquired access control information. | 2011-07-28 |
20110185399 | PARENT MATCH - A method of providing control preferences set by a person for a second person who is a prospective Internet user, the method comprising the steps of establishing a first account, the settings of the first account being stored in a database; establishing a second account, the settings of the second account being stored in the database; linking the first and second accounts such that control settings of the second account are determined through the first account; and viewing Internet content from the second account consistent with the control settings of the second account. | 2011-07-28 |
20110185400 | SYSTEM AND METHOD FOR VERIFYING THE AGE OF AN INTERNET USER - A method of verifying the age of a prospective Internet user comprises establishing an age check account; receiving information about a user, the information including an alleged age of the user; sending the information to be verified; and receiving a notification that the information has been verified. | 2011-07-28 |
20110185401 | REAL-TIME ADJUSTMENTS TO AUTHENTICATION CONDITIONS - Embodiments of the invention provide for adjusting authentication conditions in real-time. A graph-theoretic data structure is dynamically constructing, having nodes corresponding to received valid and invalid authentication credentials used in attempts to access a system. Based on the graph-theoretic data structure, embodiments compute a probability of an invalid credential being an authentication attempt by a particular type of user. If the probability is beyond a threshold probability, embodiments trigger a security event is to adjust an authentication condition of the system, e.g., to increase or decrease a maximum permissible number of failed login attempts within a certain period of time. | 2011-07-28 |
20110185402 | ACCESS CONTROL SYSTEM - A key for a user can be created according to at least one first image of the user. The key can be verified with at least one second image of the user captured after the key is created. A visitor can be authenticated according to a first measure of similarity between the key and at least one authentication image of the visitor. The visitor is authenticated as the user if the first measure of similarity is greater than a first predetermined threshold. The key can be refined with the at least one authentication image of the visitor if the first measure of similarity is lower than the first predetermined threshold and the visitor is authenticated as the user based on a password. | 2011-07-28 |
20110185403 | METHOD AND APPARATUS FOR CONTROLLING ACCESS TO A NETWORK RESOURCE - According to one aspect, there is provided a method of controlling access to a network resource. The method comprises receiving a request to grant a user access to the network resource, the request including a user identifier, determining whether the received user identifier is stored in a local user data store associated with the resource, and where it is not so determined determining, from user details stored in a master user data store, whether the user is authorized to access the resource, and where it is so determined obtaining a password, and storing the obtained password and user details in the local data store associated with the network resource. | 2011-07-28 |
20110185404 | STAGED USER DELETION - A method, system, and computer program product for staged user identifier deletion are provided. The method includes checking a status of a user identifier in response to a triggering event. In response to determining that the status of the user identifier indicates a marked for deletion status, a notification action is performed. The method also includes monitoring a time value to determine whether a time for deletion associated with the user identifier with the marked for deletion status has been reached, and automatically deleting the user identifier with the marked for deletion status in response to determining that the time for deletion has been reached. | 2011-07-28 |
20110185405 | METHOD FOR SECURE USER AND TRANSACTION AUTHENTICATION AND RISK MANAGEMENT - To provide a user signature on a network transaction, a security server receives transaction information representing a transaction between a network user and a network site, such as a website. The security server calculates a one-time-password based on the received transaction information and a secret shared by the security server and the network site, but not by the user. The security server transmits the calculated one-time-password for application as the user's signature on the transaction. The one-time-password is independently calculable by the network site based on the shared secret. | 2011-07-28 |
20110185406 | Systems and Methods to Authenticate Users - Systems and methods are provided to facilitate online transactions via mobile communications. In one aspect, a system includes a data storage facility to store account information with a phone number of the user and an interchange coupled with the data storage facility. The interchange includes a common format processor and a plurality of converters to interface with a plurality of different controllers of mobile communications. The converters are configured to communicate with the controllers in different formats; and the converters are configured to communicate with the common format processor in a common format to facilitate authentication of the user to sign in the account. | 2011-07-28 |
20110185407 | Authentication System - The invention relates to an authentication system for a user possessing a means ( | 2011-07-28 |
20110185408 | SECURITY BASED ON NETWORK ENVIRONMENT - A method comprises assessing a network environment in which an electronic device is present and implementing a security feature based on the assessment of the network environment. Assessing the network environment comprises identifying other network entities on a network to which the electronic device is coupled. | 2011-07-28 |
20110185409 | Authentication Method and System of At Least One Client Device with Limited Computational Capability - An authentication method of a server device and at least one client device with limited computational capability includes randomly generating an initial codeword using the client device. The initial codeword is generated from a linear combination of at least one base. The base is assigned to the client device and selected from a generator matrix that is stored in the server device and that corresponds to a linear code. | 2011-07-28 |
20110185410 | METHOD FOR PERSONALIZED MEETING AND RELATIONSHIP ESTABLISHING - A method for personal online/offline meeting comprising the steps of an initiator developing a profile/account with a central organization; the central organization providing the initiator with a number of cards on which are printed at least a website designation and a code; the initiator giving a card to at least one recipient; the recipient going to the website designated on the card; the recipient entering the code at the designated website; the recipient being given access to the initiator's profile with the central organization; and the recipient sending the initiator a message through the designated website. | 2011-07-28 |
20110185411 | METHOD OF OBTAINING A NETWORK ADDRESS - The present invention comprises a method of and apparatus for simplifying the process of access to a network for a roaming computer user, divides the responsibility of servicing a given user wanting to access the network between multiple parties and minimizes the possibility of improper dissemination of email header data as well as improper use of network resources (including server systems) by non-clients. | 2011-07-28 |
20110185412 | Providing Selective Access To A Web Site - A restricted web site has features that are selectively exposed to clients. A screening web site interacts with clients and collects data about the clients using passive and/or active techniques. The screening site generates a token for the client, and includes data in the token identifying the token and describing the client. The token is encoded in a cookie and saved in the client's web browser. The client subsequently provides the token to the restricted site. The restricted site validates the token to ensure that it is legitimate, has not expired, and has not been used before. The restricted site selects one or more features to provide to the client based on the data about the client in the token and/or on other information. If the client does not present a token or the token is invalid, the restricted site does not expose any features to the client. | 2011-07-28 |
20110185413 | SYSTEM, APPARATUS, AND PROGRAM FOR BIOMETRIC AUTHENTICATION - A client apparatus transmits environmental information acquired from an environmental information acquisition device as well as a biometric authentication information matching result to a server apparatus. The server apparatus verifies the validity of the environmental information such as a luminance as well as the validity of the biometric authentication information matching result. If an environment is problematic, the server apparatus notifies the client apparatus that the environmental information is problematic. The client apparatus overcomes the problem of the environment such as the luminance based on the notification from the server apparatus and then retries a biometric authentication. The possibility of re-failure due to the environmental problem can be reduced during a retry of the biometric authentication. | 2011-07-28 |
20110185414 | System and Method for Single Sign-On Session Management Without Central Server - A method and system for single sign-on session management. Functions of session management and client log-in, normally handled by separate system servers, are incorporated as plug-in modules on individual web content servers. In this manner, network traffic to grant and validate client user credentials is reduced or minimized. | 2011-07-28 |
20110185415 | System and method for information exchange by means of web-enabled personal trusted device - A system and method for token-based information dispatch is proposed. The system establishes a link between a user via his/her personal trusted device (PTD) and a Publisher that publishes a request for information exchange in the form of a unique number (token), encoded in optical or radio frequency signal. The user PTD reads said signal, establishes a link with the Publisher, and authorizes exchange of information between the user, the Publisher, and the parties designated by the Publisher. | 2011-07-28 |
20110185416 | METHOD AND APPARATUS FOR AUTHENTICATING A PERSON BY THEIR TYPING PATTERN USING THE LOCAL DISTRIBUTION OF KEYS ON A KEYBOARD - The present invention relates to a method and an apparatus for authenticating a person by means of their typing pattern, wherein, evaluation of key actuation takes account of the local position of the actuated keys ( | 2011-07-28 |
20110185417 | Memory Whitelisting - An enhanced whitelisting module associated within a system whitelists unknown files for execution on the system. The whitelisting module may oversee the computation of a hash of a file loaded into the memory and comparison of the hash to hashes within a hash table generated from clean files located on a clean system. The whitelisting module may communicate to a device internal and/or external to the system to retrieve the hash table of clean files. In certain embodiments, a rolling hash (or other piecewise hash) may be used to determine the location and/or extent of the differences between a modified file and a clean file. | 2011-07-28 |
20110185418 | DIGITAL FILTER CORRELATION ENGINE - A digital filter correlation engine, wherein the correlation engine combines N arbitrary digital filter states based on the weights and along with a threshold generate a network incident. This network incident in turn can be feedback to another digital filter. This multi-layering capability allows the creation of higher level event detections that are time-based for a cyber security analyst to analyze, thereby reducing the amount of manual work the analyst has to do in inspecting behaviors within the network. | 2011-07-28 |
20110185419 | METHOD AND APPARATUS FOR DETECTING SSH LOGIN ATTACKS - A digital filter correlation engine, wherein the correlation engine combines N arbitrary digital filter states based on the weights and along with a threshold generate a network incident. This network incident in turn can be feedback to another digital filter. This multi-layering capability allows the creation of higher level event detections that are time-based for a cyber security analyst to analyze, thereby reducing the amount of manual work the analyst has to do in inspecting behaviors within the network. | 2011-07-28 |
20110185420 | DETECTION METHODS AND DEVICES OF WEB MIMICRY ATTACKS - A web mimicry attack detection device is provided, including: a first token sequence collector receiving a hypertext transfer protocol request and extracting string content of the hypertext transfer protocol request according to a token collection method to generate a token sequence corresponding to the hypertext transfer protocol request, wherein the token sequence comprises a plurality of the tokens; and a mimicry attack detector generating a label and a confidence score corresponding individually to the tokens according to the tokens and a conditional random field probability model, summing the confidence score individually corresponding to the tokens in the token sequence by a summary rule to generate a summary confidence score, and determining whether the hypertext transfer protocol request is an attack according to the summary confidence score and the label individually corresponding to the tokens. | 2011-07-28 |
20110185421 | SYSTEM AND METHOD FOR NETWORK SECURITY INCLUDING DETECTION OF MAN-IN-THE-BROWSER ATTACKS - A method is performed in a network security system implemented in a computer or electronic device that is coupled to secured online resources for detecting unauthorized accesses of those secured online resources. The method includes monitoring a user activity session. It is determined whether the user activity session is indicative of a hidden session by an attacker, where the determination includes comparing the user activity session to an average user activity session. | 2011-07-28 |
20110185422 | Method and system for adaptive anomaly-based intrusion detection - The input characteristics of a real-time IDS change continuously with time therefore setting a rigid (time and behavior invariant) classification threshold limits the accuracy that the IDS can potentially achieve. A generic threshold tuning method and system is proposed which can adaptively tune the detection threshold of a real-time IDS in accordance with varying host and network behavior. The method and system perform statistical and information-theoretic analyses of network and host-based IDSs' anomaly based intrusions to reveal a consistent time correlation structure between benign activity periods which is used to predict future anomaly scores and to adapt an IDS' detection threshold accordingly. | 2011-07-28 |
20110185423 | METHOD AND SYSTEM FOR DETECTION OF MALWARE THAT CONNECT TO NETWORK DESTINATIONS THROUGH CLOUD SCANNING AND WEB REPUTATION - A method for detecting malware includes the steps of identifying a one or more open network connections of an electronic device, associating one or more executable objects on the electronic device with the one or more open network connections of the electronic device, determining the address of a first network destination that is connected to the open network connections of the electronic device, receiving an evaluation of the first network destination, and identifying one or more of the executable objects as malware executable objects. The evaluation includes an indication that the first network destination is associated with malware. The malware executable objects includes the executable objects that are associated with the open network connections that are connected to the first network destination. | 2011-07-28 |
20110185424 | SYSTEM AND METHOD FOR PROACTIVE DETECTION AND REPAIR OF MALWARE MEMORY INFECTION VIA A REMOTE MEMORY REPUTATION SYSTEM - A method for detecting malware memory infections includes the steps of scanning a memory on an electronic device, determining a suspicious entry present in the memory, accessing information about the suspicious entry in a reputation system, and evaluating whether the suspicious entry indicates a malware memory infection. The memory includes memory known to be modified by malware. The suspicious entry is not recognized as a safe entry. The reputation system is configured to store information on suspicious entries. The evaluation is based upon historical data regarding the suspicious entry. | 2011-07-28 |
20110185425 | NETWORK ATTACK DETECTION DEVICES AND METHODS - A network attack detection device is provided, including a spatial coordinate database for storing spatial coordinate data; a standard time zone database for storing standard time zone data; a domain name system packet collector for collecting a domain name system packet; a spatial snapshot feature extractor for extracting internet protocol address corresponding to the domain name system packet according to the domain name system packet, and generating spatial feature data corresponding to the internet protocol address according to the internet protocol address, the spatial coordinate data and the standard time zone data; and an attack detector for determining whether the domain name system packet is an attack according to the spatial feature data and a spatial snapshot detection model, and when determining that the domain name system packet is an attack, sending a warning to indicate the attack. | 2011-07-28 |
20110185426 | DETECTION OF NETWORK SECURITY BREACHES BASED ON ANALYSIS OF NETWORK RECORD LOGS - Computer program products and methods of inspecting a log of security records in a computer network are provided. The method includes retrieving a log record, processing the log record including deriving a key to a table, determining a data value from information in the log record and adding the data value to a list of data values associated with the key if the data value is unique. One or more entries of the table are evaluated based on predetermined criteria to detect attempted security breaches. | 2011-07-28 |
20110185427 | SAFELY PROCESSING AND PRESENTING DOCUMENTS WITH EXECUTABLE TEXT - Techniques for processing documents with executable text are disclosed. The techniques, among other things, can effectively address XSS attacks to Internet users when browsing web sites. Content deemed not to be trusted or fully trusted (“untrusted”) can be marked in a document that can include executable text. Remedial action, including not allowing execution of executable text marked as “untrusted” can be taken. In addition, when the document is processed, content deemed not to be trusted or fully trusted (“untrusted”) can be effectively monitored in order to identify executable text that may have been effectively produced by “untrusted” content and/or somehow may have been affected by “untrusted” content. | 2011-07-28 |
20110185428 | METHOD AND SYSTEM FOR PROTECTION AGAINST UNKNOWN MALICIOUS ACTIVITIES OBSERVED BY APPLICATIONS DOWNLOADED FROM PRE-CLASSIFIED DOMAINS - A method for monitoring an application includes the steps of detecting the download of an application that originates from a website, identifying the domain of the website, and querying a database to select one or more behavioral analysis rules to apply to the application. The behavioral analysis rules are selected based upon an evaluation of the domain of the website. The evaluation of the domain of the website indicates a possible association with malware. | 2011-07-28 |
20110185429 | METHOD AND SYSTEM FOR PROACTIVE DETECTION OF MALICIOUS SHARED LIBRARIES VIA A REMOTE REPUTATION SYSTEM - A method for proactively detecting shared libraries suspected of association with malware includes the steps of determining one or more shared libraries loaded on an electronic device, determining that one or more of the shared libraries include suspicious shared libraries by determining that the shared library is associated with indications that the shared library may have been maliciously injected, loaded, and/or operating on the electronic device, and identifying the suspicious shared libraries to a reputation server. | 2011-07-28 |
20110185430 | METHOD AND SYSTEM FOR DISCRETE STATEFUL BEHAVIORAL ANALYSIS - A method for analyzing a computing system includes the steps of at a first moment in time, scanning the resources of the computing system for indications of malware, at a second moment in time scanning the resources of the computing system for indications of malware and determining the system executable objects loaded on the computing system, determining malware system changes, identifying a relationship between the malware system changes and the system executable objects loaded on the computing system, and identifying as suspected malware the system executable objects loaded on the computing system which have a relationship with the malware system changes. The malware system changes include differences between the results of scanning the resources of the computing system for indications of malware at the second and first moment of time. | 2011-07-28 |
20110185431 | SYSTEM AND METHOD FOR ENABLING REMOTE REGISTRY SERVICE SECURITY AUDITS - The system and method for enabling remote registry service security audits described herein may include scanning a network to construct a model or topology of the network. In particular, the model or topology of the network may include characteristics describing various devices in the network, which may be analyzed to determine whether a remote registry service has been enabled on the devices. For example, the security audits may include performing one or more credentialed policy scans to enable the remote registry service for certain devices that have disabled the remote registry service, auditing the devices in response to enabling the remote registry service, and then disabling the remote registry service on the devices. Thus, the system and method described herein may enable remotely scanning information contained in device registries during a security audit without exposing the device registries to malicious activity. | 2011-07-28 |
20110185432 | Cyber Attack Analysis - In certain embodiments, analyzing cyber attacks includes receiving cyber attack parameters. A cyber attack parameter describes a performance attribute of a cyber attack scenario. The cyber attack parameters comprises at least one temporal parameter describing a temporal feature of the cyber attack scenario. The following is performed for each cyber defense of one or more cyber defenses to yield one or more sets of cyber attack metrics: simulating the cyber attack operating with a cyber defense; and determining a set of cyber attack metrics describing the cyber attack operating with the cyber defense. The cyber defenses are evaluated in accordance with the sets of cyber attack metrics. | 2011-07-28 |
20110185433 | CONSTRAINT INJECTION SYSTEM FOR IMMUNIZING SOFTWARE PROGRAMS AGAINST VULNERABILITIES AND ATTACKS - A constraint is inserted into a program to address a vulnerability of the program to attacks. The constraint includes a segment of code that determines when the program has been asked to execute a “corner case” which does not occur in normal operations. The constraint code can access a library of detector and remediator functions to detect various attacks and remediate against them. Optionally, the detector can be employed without the remediator for analysis. The context of the program can be saved and restored if necessary to continue operating after remediation is performed. The constraints can include descriptors, along with machine instructions or byte code, which indicate how the constraints are to be used. | 2011-07-28 |
20110185434 | WEB INFORMATION SCRAPING PROTECTION - A method and a filter element for preventing scraping/clipping of the information content of a database used for providing a website with data information. When a data record set from the database has been received, the filter splits all elements/fields of the data record set in a predetermined way into cells and a sortid is provided. Each cell is encoded into a markup language, wherein location information in the cell is used for generating a location value. The encoded cells are sorted into a file to establish a file, e.g. web page, wherein the encoded data cells are distributed in an arbitrary order. | 2011-07-28 |
20110185435 | FLASH MEMORY STORAGE SYSTEM, AND CONTROLLER AND ANTI-FALSIFYING METHOD THEREOF - A flash memory storage system having a flash memory controller, a flash memory chip and a smart card chip is provided. The flash memory chip is configured to store security data. The flash memory controller generates a signature corresponding to the security data according to, a private key and the security data with a one-way hash function, and stores the signature into the smart card chip. | 2011-07-28 |
20110185436 | URL FILTERING BASED ON USER BROWSER HISTORY - A URL monitoring system may use a user's browsing history to generate a score for the user. The score may be used to permit or deny access to a URL. The score may be used to represent the user's intent when browsing, and based on that intent, the user may be allowed access to a URL with conflicting classifications. The score may be also be used as a trustworthiness score so that a user who browses responsibly may have their score increased over time, and a user who browses irresponsibly or inappropriately may have their score decreased. The scores may be calculated and maintained on a user's client device, edge device, or other device within a network. | 2011-07-28 |
20110185437 | METHOD AND SYSTEM FOR MULTI-USER, MULTI-DEVICE LOGIN AND CONTENT ACCESS CONTROL AND METERING AND BLOCKING - A method and system for multi-user, multi-device content access metering and control is provided. In one embodiment, a system implements a method such that in response to user login requests, the system controls login access by providing multiple users login access to plural electronic devices capable of communicating via a communication system. Further, in response to user content access actions, the system controls access to content by selectively providing content to said one or more users via said one or more electronic devices based on content access policies. | 2011-07-28 |
20110185438 | REGULATOR OF COMMANDS WHICH ARE DESTINED FOR A SENSITIVE APPLICATION - The present invention describes a method and a software module making it possible to secure communications with a sensitive application, for which exchanges with the outside have been delegated to a so-called interfacing application. Accordingly, the present invention describes the application of security rules to all or some of the commands destined for this sensitive application. | 2011-07-28 |
20110185439 | G PROTEIN COUPLED RECEPTORS AND USES THEREOF - The present invention provides GPCR polypeptides and polynucleotides, recombinant materials, and transgenic mice, as well as methods for their production. The polypeptides and polynucleotides are useful, for example, in methods of diagnosis and treatment of diseases and disorders. The invention also provides methods for identifying compounds (e.g., agonists or antagonists) using the GPCR polypeptides and polynucleotides of the invention, and for treating conditions associated with GPCR dysfunction with the GPCR polypeptides, polynucleotides, or identified compounds. The invention also provides diagnostic assays for detecting diseases or disorders associated with inappropriate GPCR activity or levels. | 2011-07-28 |
20110185440 | CISD2-Knockout Mice and Uses Thereof - The present invention is related to a Cisd2 knockout mouse with phenotype comprising mitochondrial breakdown and dysfunction, wherein Cisd2 is defined as SEQ ID NO. 1. The present invention is also related to a mouse model of Wolfram Syndrome 2 (WFS2) disease consisting of a Cisd2 knockout mouse. The present invention is further related to a method for screening a candidate agent for preventing or treating WFS2 disease. | 2011-07-28 |
20110185441 | TRANSGENIC ANIMALS AND METHODS OF MAKING RECOMBINANT ANTIBODIES - The present invention describes a means for obtaining cells which produce human, humanized or chimeric antibodies in commercially useful quantities. The invention permits high antibody producer cells to be selected and isolated from animals for use in culture to produce antibodies. The invention also provides methods for the affinity maturation of human, humanized or chimeric immunoglobulins. | 2011-07-28 |
20110185442 | Method of generating transgenic organisms using transposons - The invention relates to a method for generating a transgenic organism. The invention also relates to a method for detecting and characterizing a genetic mutation in a transgenic organism. The invention further relates to a method for isolating a gene which is correlated with a phenotypic characteristic in a transgenic animal. The invention further relates to a method for isolating an exon in a transgenic animal. The invention also relates to a method for modulating the expression of a gene in an organism. | 2011-07-28 |
20110185443 | WATERMELON POLLENIZER SP-5 - The present invention provides a novel watermelon variety designated SP-5, and method for pollinating seedless watermelon plants. The present invention also provides methods for producing triploid, seedless watermelon fruit. | 2011-07-28 |
20110185444 | POLYNUCLEOTIDE AND POLYPEPTIDE SEQUENCES ASSOCIATED WITH HERBICIDE TOLERANCE - This invention relates generally to the detection of genetic differences among soybeans. More particularly, soybean quantitative trait loci (QTL) associated with herbicide tolerance, including tolerance to one or more of an HPPD-inhibitor herbicide, such as mesotrione and isoxazole herbicides, and/or a PPO inhibitor herbicide; soybean plants possessing these QTLs; and genetic markers that are indicative of phenotypes associated with such herbicide tolerance are provided. Methods and compositions for use of these markers in genotyping of soybean and selection are also disclosed, as are methods and compositions for use of herbicides for weed control. Also disclosed are isolated polynucleotides and polypeptides relating to such tolerance or sensitivity and methods of introgressing such tolerance into a plant by breeding or transgenically, or by a combination thereof. Plant cells, plants, and seeds produced are also provided. | 2011-07-28 |
20110185445 | HPPD-INHIBITOR HERBICIDE TOLERANCE - This invention relates generally to the detection of genetic differences among soybeans. More particularly, the invention relates to soybean quantitative trait loci (QTL) for tolerance or sensitivity to HPPD-inhibitor herbicides, such as mesotrione and isoxazole herbicides, to soybean plants possessing these QTLs, which map to a novel chromosomal region, and to genetic markers that are indicative of phenotypes associated with tolerance, improved tolerance, susceptibility, or increased susceptibility. Methods and compositions for use of these markers in genotyping of soybean and selection are also disclosed, as are methods and compositions for use of these markers in selection and use of herbicides for weed control. Also disclosed are isolated polynucleotides and polypeptides relating to such tolerance or sensitivity and methods of introgressing such tolerance into a plant by breeding or transgenically or by a combination thereof. Plant cells, plants, and seeds produced are also provided. | 2011-07-28 |
20110185446 | Soybean Cultivar 3955412 - A soybean cultivar designated 3955412 is disclosed. The invention relates to the seeds of soybean cultivar 3955412, to the plants of soybean 3955412, to plant parts of soybean cultivar 3955412, and to methods for producing a soybean plant produced by crossing soybean cultivar 3955412 with itself or with another soybean variety. The invention also relates to methods for producing a soybean plant containing in its genetic material one or more transgenes and to the transgenic soybean plants and plant parts produced by those methods. This invention also relates to soybean cultivars, or breeding cultivars, and plant parts derived from soybean variety 3955412, to methods for producing other soybean cultivars, lines or plant parts derived from soybean cultivar 3955412, and to the soybean plants, varieties, and their parts derived from use of those methods. The invention further relates to hybrid soybean seeds, plants, and plant parts produced by crossing the cultivar 3955412 with another soybean cultivar. | 2011-07-28 |
20110185447 | LETTUCE CULTIVAR 51-0804523-B - A lettuce cultivar, designated 51-0804523-B, is disclosed. The invention relates to the seeds of lettuce cultivar 51-0804523-B, to the plants of lettuce cultivar 51-0804523-B and to methods for producing a lettuce plant by crossing the cultivar 51-0804523-B with itself or another lettuce cultivar. The invention further relates to methods for producing a lettuce plant containing in its genetic material one or more transgenes and to the transgenic lettuce plants and plant parts produced by those methods. This invention also relates to lettuce cultivars or breeding cultivars and plant parts derived from lettuce cultivar 51-0804523-B, to methods for producing other lettuce cultivars, lines or plant parts derived from lettuce cultivar 51-0804523-B and to the lettuce plants, varieties, and their parts derived from the use of those methods. The invention further relates to hybrid lettuce seeds, plants, and plant parts produced by crossing cultivar 51-0804523-B with another lettuce cultivar. | 2011-07-28 |
20110185448 | MARKERS ASSOCIATED WITH SOYBEAN RUST RESISTANCE AND METHODS OF USE THEREFOR - Methods for conveying soybean rust (SBR) resistance into non-resistant soybean germplasm are provided. In some embodiments, the methods include introgressing SBR resistance into a non-resistant soybean using one or more nucleic acid markers for marker-assisted breeding among soybean lines to be used in a soybean breeding program, wherein the markers are linked to and/or associated with SBR resistance. Also provided are single nucleotide polymorphisms (SNPs) associated with resistance to SBR; soybean plants, seeds, and tissue cultures produced by any of the disclosed methods; seed produced by the disclosed soybean plants; and compositions including amplification primer pairs capable of initiating DNA polymerization by a DNA polymerase on soybean nucleic acid templates to generate soybean marker amplicons. | 2011-07-28 |
20110185449 | Modified Xylan Production - Methods and means for producing xylan structures in plants having a non-native saccharide moiety substitution side chain component, plants and plant cells comprising modified xylan structures, methods of identifying mutant plants comprising xylan structures in plants having a non-native saccharide moiety substitution pattern side chain component, uses thereof, and isolated xylan structures and uses thereof. | 2011-07-28 |
20110185450 | PLANT 1-DEOXY-D-XYLULOSE 5-PHOSPHATE REDUCTOISOMERASE - This invention relates to an isolated nucleic acid fragment encoding a 1-deoxy-D-xylulose 5-phosphate reductoisomerase. The invention also relates to the construction of a chimeric gene encoding all or a portion of the 1-deoxy-D-xylulose 5-phosphate reductoisomerase, in sense or antisense orientation, wherein expression of the chimeric gene results in production of altered levels of the 1-deoxy-D-xylulose 5-phosphate reductoisomerase in a transformed host cell. | 2011-07-28 |
20110185451 | PMMOV Resistant Capsicum Plants - The present invention relates to a plant of the | 2011-07-28 |
20110185452 | COMPOSITIONS AND METHODS FOR IMPROVING PLANTS - The invention provides an isolated polynucleotide encoding a polypeptide with the sequence of SEQ ID NO: 1 or a variant thereof, wherein the variant is a polypeptide capable of modulating in a plant at least one of: i) biomass, ii) seed yield, and III) tolerance to at least one environmental stress selected from drought, cold, freezing, heat and salinity. The invention also provides, construct, vectors, host cells, plant cells and plants genetically modified to comprise the polynucleotide. The invention also provides methods for producing and selecting plants that are altered for at least one of: i) biomass, ii) seed yield, and iii) tolerance to at least one environmental stress selected from drought, cold, freezing, heat and salinity, making use of the polynucleotides of the invention. | 2011-07-28 |
20110185454 | Polypeptides having endoglucanase activity and polynucleotides encoding same - The present invention relates to isolated polypeptides having endoglucanase activity and isolated polynucleotides encoding the polypeptides. The invention also relates to nucleic acid constructs, vectors, and host cells comprising the polynucleotides as well as methods for producing and using the polypeptides. | 2011-07-28 |