33rd week of 2010 patent applcation highlights part 60 |
Patent application number | Title | Published |
20100211789 | INLINE KEY-BASED PEER-TO-PEER PROCESSING - Various exemplary embodiments relate to a method and related network element including one or more of the following: receiving, in a network element in the telecommunications network, a first plurality of packets transmitted from a P2P client to a P2P central entity, the first plurality of packets relating to a request for peer location information; performing deep packet inspection (DPI) to extract a key from the request for peer location information, the key identifying a P2P content item; querying a key storage module using the key to determine whether the key corresponds to a P2P content item for which transfers are to be prevented; and preventing subsequent transfers of the P2P content item between the P2P client and one or more peers that maintain the P2P content item. | 2010-08-19 |
20100211804 | System And Method For Dynamic Modular Information Handling System Power Distribution - Infrastructure power resources of a chassis information handling system are made available to run chassis information handling system modules when infrastructure devices are not using the power resources. For example, cooling fans that cool information handling system modules supported by an information handling system chassis run at variable speeds having variable power consumption. A power reserve maintained to run the cooling fans at full speed if needed is made available to information handling system modules when under power management by a chassis manager. | 2010-08-19 |
20100211823 | BROWSER BASED WEB CONFERENCING EMPLOYING LAYERING TO DISPLAY SCREEN UPDATES - A browser based web conferencing method is disclosed, wherein a request to receive a screen update image of a first layer is transmitted over a network, and the screen update image of the first layer is displayed. A request to receive a screen update image of a second layer is transmitted over the network, and the screen update image of the second layer is displayed, wherein the screen update image of the second layer overlaps the screen update image of the first layer. An image-load script is executed in connection with receiving one of the screen update images, wherein the image-load script executes the request-update script after all of the screen update images of the first layer have been displayed. | 2010-08-19 |
20100211829 | FAILURE DETECTION AND RECOVERY OF HOST COMPUTERS IN A CLUSTER - In one or more embodiments of the invention, communication among host agents providing high availability in a computer cluster is implemented by reading and writing to files on a shared data store. Each host agent holds a lock on a file on the shared data store corresponding to a liveness indicator for the host agent and a coordinator host agent periodically monitors the liveness indicators for host failures. | 2010-08-19 |
20100211841 | METHOD, APPARATUS AND SYSTEM FOR CODING AND DECODING OF LDPC CODES - The present invention discloses a method, an apparatus and a system for low-density parity-check (LDPC) coding and decoding. The coding method includes the following steps: constructing each layer of a check matrix of a layered LDPC code used as an error correcting code; when data is initially sent by a data transmitting terminal, performing first-layer-coding of the data to be sent by using the first layer of a check matrix of the LDPC code, sending the first-layer-coded data; when data for (n−1)th retransmission is sent by the data transmitting terminal, performing nth-layer-coding of the data by using the nth layer of a check matrix of the LDPC code, sending the nth-layer-coded data, wherein n is an integer no less than 2. It is possible to reduce the system overhead, decrease the decoding delay, and improve the decoding performance by using the technical solution of the present invention which is also adapted to high-speed data services. | 2010-08-19 |
20100211849 | MULTI-DIMENSIONAL LDPC CODED MODULATION FOR HIGH-SPEED OPTICAL TRANSMISSION SYSTEMS - Arbitrarily high data transmission rates may be achieved by the use of N-dimensional, LDPC-coded modulation. N orthonormal basis functions are employed using coherent reception, resulting in a proportional increase in transmission rate with only a modest increase in bit-error ratio. | 2010-08-19 |
20100211861 | CONTENT DISTRIBUTION MANAGEMENT DEVICE, COMMUNICATION TERMINAL, PROGRAM, AND CONTENT DISTRIBUTION SYSTEM - To provide a mechanism for supporting prevention of unintentional access to contents provided by malicious content providers. A gateway server device | 2010-08-19 |
20100211903 | User Interface for Wafer Data Analysis and Visualization - A wafer viewer system is provided for graphical presentation and analysis of a wafer and a wafer series. More specifically, the wafer viewer system includes a graphical user interface for displaying a wafer, graphically selecting regions of the wafer for analysis, performing analysis on the selected regions of the wafer, and displaying results of the analysis. | 2010-08-19 |
20100211906 | APPLICATION PROGRAM AND IMAGE PROCESSING APPARATUS - An application program capable of operating on a prescribed operating system includes a plurality of functional processing units, a window processing unit allowing a window corresponding to any of the functional processing units operated in a case where any of the plural functional processing units is operated, a minimization unit minimizing the window, and a setting selection unit selecting setting information for the minimization. The minimization unit minimizes the window based on the setting information selected by the setting selection unit, and the setting selection unit is capable of selecting the setting information with respect to each of the plural functional processing units. | 2010-08-19 |
20100211925 | EVALUATING A SERVICE ORIENTED ARCHITECTURE SHARED SERVICES PROJECT - An approach that evaluates a service oriented architecture (SOA) shared services project is provided. In one embodiment, there is a service discovery tool, including an analysis component configured to analyze a potential SOA shared services project, and a determination component configured to determine whether the potential SOA shared services project should proceed to an inception process based on an analysis of the potential SOA shared services project. | 2010-08-19 |
20100211934 | APPARATUS AND METHOD FOR SERVICE-ENABLING COMPUTER PROGRAMS - A method of injecting services into a computer program includes analyzing the computer program to evaluate its technologies. The method further includes identifying objects within the running computer program to inform an injected service that an event has occurred, and modifying the computer program so that the injected service responds to an occurrence of the determined object. | 2010-08-19 |
20100211954 | PRACTICAL CONTENTION-FREE DISTRIBUTED WEIGHTED FAIR-SHARE SCHEDULER - Embodiments of the invention provide a method, system and computer program product for scheduling tasks in a computer system. In an embodiment, the method comprises receiving a multitude of sets of tasks, and placing the tasks in one or more task queues. The tasks are taken from the one or more task queues and placed in a priority queue according to a first rule. The tasks in the priority queue are assigned to a multitude of working threads according to a second rule based, in part, on share values given to the tasks. In an embodiment, the tasks of each of the sets are placed in a respective one task queue; and all of the tasks in the priority queue from each of the task queues, are assigned as a group to one of the working threads. | 2010-08-19 |
20100211963 | INFORMATION PROCESSING APPARATUS, CONTROL METHOD, AND PROGRAM - An information processing apparatus capable of USB-connecting a device compatible with USB connection, the apparatus has a management unit configured to manage driver information representing whether to activate a device driver when the device is USB-connected. The information processing apparatus also has a device information acquisition unit configured to acquire device information of the device. The information processing apparatus also has a setting unit configured to set up the driver under control of an USB core driver to control the device using a device driver corresponding to the driver information when the driver information matches the device information. | 2010-08-19 |
20100211970 | SYSTEM AND METHOD FOR BYPASSING AN EMERGENCY ALERT BREAK-IN - Embodiments of the disclosed invention include a system and a method for bypassing an emergency alert break-in. An emergency alert break-in means any message, alert, and/or newscast that interrupts by preempting and/or modifying displaying of a regularly scheduled program to present information associated with an urgent and/or important event. For example, in one embodiment, a method is disclosed that includes receiving data from a media content provider; identifying from the data an emergency alert break-in; presenting a user interface that includes an option for bypassing the emergency alert break-in; and displaying a regularly scheduled program in response to receiving a request to bypass the emergency alert break-in. | 2010-08-19 |
20100212000 | SYSTEM, METHOD AND PROGRAM FOR USER AUTHENTICATION, AND RECORDING MEDIUM ON WHICH THE PROGRAM IS RECORDED - A method, and system, and computer program product for authenticating a user. A first server of a plurality of servers receives an access request from the user to access a federated computing environment that comprises multiple servers. After receiving the access request, the first server: receives input authentication information from the user, obtains a server address of a second server having an authentication policy that matches an authentication policy of the first server, transmits the input authentication information to the second server via the server address of the second server, receives from the second server a notification that the second server has successfully authorized the user, and permits the user to access the federated computing environment. | 2010-08-19 |
20100212001 | SYSTEM AND METHOD FOR USER LOGIN TO A MULTIMEDIA SYSTEM USING A REMOTE CONTROL - Embodiments include systems and methods for user login to a multimedia system. In one embodiment, a method of logging in one or more user profiles on a multimedia system includes associating one or more actuation sequences of one or more buttons on a remote control device each with a user profile, each user profile having one or more characteristics for outputting multimedia content, the characteristics affecting multimedia content provided by a multimedia system to personalize the user's multimedia experience, communicating a first signal corresponding to one of the one or more actuation sequences from the remote control device to a multimedia system to identify a first user profile for login, logging in the first user profile as an active user profile on the multimedia system based on the first signal, and controlling multimedia content provided to an output system of the multimedia system based on the active user profile. | 2010-08-19 |
20100212002 | CONSTRAINING A LOGIN TO A SUBSET OF ACCESS RIGHTS - This document describes tools that constrain a login to a subset of access rights. In one embodiment, the tools generate a constrained password by executing a cryptographic algorithm on a user ID, general password, and one or more desired constraints. The constrained password is used in place of the general password to gain access rights that are a subset of the access rights that would be granted if the general password were used instead. | 2010-08-19 |
20100212005 | DISTRIBUTED DENIAL-OF-SERVICE SIGNATURE TRANSMISSION - A system and method of transmitting a DDoS, or distributed denial of service, signature from an intra-network to an internet is presented. The method includes identifying a DDoS signature and employing an inter-domain routing protocol configured to enable-operational information to be exchanged between nodes. The DDoS signature is embedded as payload of the standards-compliant inter-domain routing protocol. The step of embedding occurs within a network. The embedded DDoS signature is then sent from the network to an internet node outside of the network. The method further includes applying the DDoS signature to enable the internet nodes to filter packets matching the DDoS signature. | 2010-08-19 |
20100212006 | PEER-TO-PEER TRAFFIC MANAGEMENT BASED ON KEY PRESENCE IN PEER-TO-PEER DATA TRANSFERS - Various exemplary embodiments relate to a method and related network element including one or more of the following: receiving a plurality of packets belonging to an IP flow, the packets received in a network element in the telecommunications network; performing deep packet inspection (DPI) to identify an application protocol associated with the flow; when the application protocol is a peer-to-peer (P2P) protocol, performing DPI to extract a key from one or more of the packets in the flow, the key uniquely identifying a P2P content item; querying a P2P content database using the key, the P2P content database maintaining a mapping between keys and corresponding traffic management actions; and when the key is located in the P2P content database, performing the traffic management action associated with the key in the P2P content database. | 2010-08-19 |
20100212009 | Multi-Method Emergency Access - A method or system for providing multiple fallback authentication options via self-service, also known as emergency access, for users to access PC or network systems when their primary authentication method has been lost, blocked or otherwise unavailable. | 2010-08-19 |
20100212010 | SYSTEMS AND METHODS THAT DETECT SENSITIVE DATA LEAKAGES FROM APPLICATIONS - In embodiments, the present invention may be a computer program product embodied in a computer readable medium that, when executing on one or more computers, may select a software application for monitoring, where the selection may be based at least in part on the basis that the software application controls confidential information, and where the software application may be an end-point application, a web application, a cloud application, and the like. The present invention may monitor the software application by determining an output data quantity that may be written from the software application. The output data may then be compared with a predetermined quantity, where the predetermined quantity may be indicative of confidential information being written from the software application. | 2010-08-19 |
20100212011 | METHOD AND SYSTEM FOR SPAM REPORTING BY REFERENCE - Methods and systems for spam reporting by reference are described. In one embodiment, an electronic message may be received by a mobile electronic device. A spam report may be transmitted from the mobile electronic device to a report server. The spam report may notify the report server that the electronic message is spam and include a reference to the electronic message without including the electronic message itself. The reference may be usable to identify the received message. | 2010-08-19 |
20100212012 | Systems and Methods for Providing Real Time Access Monitoring of a Removable Media Device - In various embodiments, a method comprises detecting a removable media device coupled to a digital device, authenticating a password to access the removable media device, injecting redirection code into the digital device, intercepting, with the redirection code, a request for data, determining to allow the request for data based on a security policy, and providing the data based on the determination. The method may further comprise selecting the security policy from a plurality of security policies based, at least in part, on the password and/or filtering the content of the requested data. Filtering the content may comprise scanning the data for malware. Filtering the content may also comprise scanning the data for confidential information. | 2010-08-19 |
20100212021 | Decrement software - Computer system that detects license characteristics, and detects if the use of specified software is within those license characteristics. If not, the software use is limited to less than the specified use. This allows all versions of the software to have all features, but limits the amount by which those features can be used. | 2010-08-19 |
20100212022 | DEVICE AND METHOD FOR DIGITAL RIGHTS MANAGEMENT - A digital rights management method includes: storing information on a rights object in a memory area, wherein the rights object has been transferred from a first device to a second device, and wherein the rights object includes permissions linked to a digital media object; receiving a rights object at the first device; and accessing the memory area to check whether information on the received rights object is stored in the memory area and to set up the received rights object on the first device in case the information on the received rights object is not stored in the memory area, and to reject the received rights object in case the information on the received rights object is stored in the memory area. | 2010-08-19 |
20100212023 | SHORTCUT MANAGEMENT UNIT AND METHOD, AND STORAGE MEDIUM - A shortcut management device capable of improving user-friendliness of a portal application. The shortcut management device is capable of executing shortcuts which use functions of an electronic apparatus, and manages at least part of the functions used by the shortcuts. A storage unit registers shortcuts. An invalidation detecting unit detects that the license is invalidated. A retrieval unit retrieves a shortcut made inexecutable in association with the license of which the invalidation is detected. An invalidation unit invalidates the retrieved shortcut. | 2010-08-19 |
20100212024 | DIGITAL VIDEO SYSTEM USING NETWORKED CAMERAS - A digital video system including a computer connected via a network to a number of video servers and cameras. The computer includes a program that provides a grid of display windows, each of which displays an image received from the camera associated with that window. The program sequentially polls each camera, accessing and displaying an image from the camera in its associated window. The program can access the cameras at different frame rates. The program stores image streams in a single file, concatenating each successive image onto the end of the file. The file is then indexed using SOI and EOI markers to permit fast access to individual images within the file. The program can monitor received video and automatically start recording upon detecting motion within the video stream. Motion detection is implemented by comparing color component values for pixels from different images. | 2010-08-19 |
20100212027 | SYSTEM AND METHOD FOR RENDERING CONTENT ASSOCIATED WITH A DIGITAL WORK - A method, system and software for permitting use of digital works having rights associated therewith in a system having repositories configured to enable use of the digital work in accordance with the rights, including associating a transfer right with a digital work, the transfer right specifying that the digital work is transferred from a first repository to a second repository; transferring the digital work from the first repository to the second repository in accordance with the transfer right; and in response to the transferring, step updating transfer right information in respect of the digital work. | 2010-08-19 |
20100212028 | ANTI-PIRACY SOFTWARE PROTECTION SYSTEM AND METHOD - A method and system for protecting software products from unauthorized use and distribution is described. The system comprises a client process executed on a client computer coupled to a producer computer over a network. The method comprises the steps of providing to a user a copy of the distributed software, the distributed software comprising an incomplete executable program requiring a security module to be installed prior to execution on the client computer. The user receives a registration code for use with the distributed software. Upon attempted execution of the distributed software the producer computer requests user registration from the user. Upon receipt of the registration information including the registration code from the user, the producer computer validates the registration code and constructing a security module for transmission to the client computer. The security module is integrated with the distributed software to allow execution of the executable program. | 2010-08-19 |
20100212029 | NOVEL ASSAYS UTILIZING NICOTINIC ACETYLCHOLINE RECEPTOR SUBUNITS - The present invention is in the field of identification and characterization of novel insecticidal target sites and, in particular, relates to host cells, assays and antibodies thereto. | 2010-08-19 |
20100212030 | USE OF N-TERMINAL AND C-TERMINAL PROTEOMICS TECHNOLOGY TO ENHANCE PROTEIN THERAPEUTICS AND DIAGNOSTICS - The present invention provides a novel method for stabilizing proteins, by first identifying the proteolytic sites using N- or C-terminal technology, followed by modification of said sites in order to create stabilized proteins, no longer subject to proteolytic cleavage. the method of the invention immediately provides the user with the exact amino acid position of the proteolytic cleavage site in the protein(s) of interest, even in a complex protein sample. This makes the specific modification of such a site much easier and increases the expectation of success as compared to the amount of effort needed, even in a complex protein sample. | 2010-08-19 |
20100212035 | Compositions and Methods for Producing Transgenic Mammals Having Recombinant Immunoglobulin Loci - The invention provides methods for the production of transgenic animals comprising a recombinant Ig locus, as well as transgenic antibodies derived therefrom. The methods involve meganuclease cleavage-stimulated homologous recombination in mammalian embryos. | 2010-08-19 |
20100212036 | SELECTIVE INHIBITION OF HISTONE DEACETYLASES 1 AND 2 AS A TREATMENT FOR CARDIAC HYPERTROPHY - The present invention provides for methods of treating and preventing cardiac hypertrophy. Class I HDACs, which are known to participate in regulation of chromatin structure and gene expression, have generally been considered as pro-hypertrophic in their action. However, the present invention demonstrates that inhibition of certain Class I HDACs should be avoided in the treatment of cardiac hypertrophy, thereby pointing toward selective, and not global, inhibition of Class I HDACs. In particular, the present invention provides for selective inhibition of HDACs 1 and/or 2, and the avoidance of inhibition of HDAC3. | 2010-08-19 |
20100212041 | Plants Having Increased Yield And A Method For Making The Same - The present invention concerns a method for increasing plant yield by modulating expression in a plant of a nucleic acid encoding a synovial sarcoma translocation (SYT) polypeptide or a homologue thereof. One such method comprises introducing into a plant a SYT nucleic acid or variant thereof. The invention also relates to transgenic plants having introduced therein a SYT nucleic acid or variant thereof, which plants have increased yield relative to corresponding wild type plants. The present invention also concerns constructs useful in the methods of the invention. | 2010-08-19 |
20100212042 | Strain of Brown Mushrooms for Commercial Production | 2010-08-19 |
20100212045 | FATTY ACID DESATURASES FROM FUNGI - The invention relates generally to methods and compositions concerning fungal desaturase enzymes that modulate the number and location of double bonds in long chain poly-unsaturated fatty acids (LC-PUFA's). In Particular, the invention relates to methods and compositions for improving omega-3 fatty acid profiles in plant products and parts using desaturase enzymes and nucleic acids encoding for such enzymes. In particular embodiments, the desaturase enzymes are fungal −15 desaturases. Also provided are improved canola oil compositions having SDA and maintaining beneficial oleic acid content. | 2010-08-19 |
20100212046 | PROMOTOR SEQUENCE AND GENE CONSTRUCT FOR INCREASING CROP YIELD IN TOMATO - The present invention relates to a SP3D promotor sequence, capable of directing transcription of a downstream SP3D gene that is operably linked to said promotor sequence, wherein the promotor sequence is derived from a species of the Solanaceae family having a sympodial index of 2, for reducing sympodial index in plants having a sympodial index of 3 or more. The invention also relates to methods for providing plants of the Solanaceae family, in particular | 2010-08-19 |
20100212049 | Compositions and Methods of Use of Response Regulators - Methods and compositions for modulating plant development are provided. Methods employing type A Response Regulators (RR) are provided. The type A RR sequences are used in a variety of methods including modulating root development, modulating leaf and/or shoot development, modulating shoot regeneration from callus, modulating tolerance under abiotic stress, modulating yield, modulating cytokinin level/activity, and modulating plant responsiveness to cytokinin. Transformed plants, plant cell, tissues, seed, and expression vectors are also provided. | 2010-08-19 |
20100212050 | PLANTS OVER-EXPRESSING PME - The present invention relates to compositions and methods for over-expressing pectin methylesterases (PMEs), particularly type 1 PMEs (PME1s), in plants while maintaining growth as compated to the wild type. The plants of the invention have improved properties compared to the wild type, particularly improved resistance to salinity. | 2010-08-19 |
20100212053 | PENNISETUM PLANT NAMED 'TIFT-17' - The new variety | 2010-08-19 |
20100212054 | Pennisetum 'Tift-23' - The new variety | 2010-08-19 |
20100212055 | CALIBRACHOA PLANT NAMED 'SAKCAL098' - ‘SAKCAL098’ is a new | 2010-08-19 |