35th week of 2008 patent applcation highlights part 78 |
Patent application number | Title | Published |
20080209533 | Method and system for online image security - An online application enables an end user to navigate to a web site, upload digital images, and to combine those images with words in a stylized template to create a user-generated story. A story is a web page, typically a collection of photos and words that are brought together by a stylized template that can be customized by the end user. Preferably, a given story is available from the site at a given location (at a URL) that may be private or public. A given story may be shared with other end users, published to other web sites or web logs, or maintained solely for one's own use. The invention also provides for multiple end users to collaborate to create a “shared” story. | 2008-08-28 |
20080209534 | Token based applicaions platform method, system and apparatus - A method that enables the mapping of token identity and token presentation context to invoke one or more applications that are associated with the given token and context is disclosed. The method enables the construction of a flexible and efficient token-in-context services platform. | 2008-08-28 |
20080209535 | Configuration of mandatory access control security policies - Presented herein are systems and methods for configuring a mandatory access control security policy in a computer, and applications thereof. An embodiment provides a security configuration program. The security configuration program configures a security policy based on user input. For example, a user may provide input regarding ranges of values corresponding to a resource, such as ports and/or Internet protocol (IP) addresses, to which a process is to be granted access. The security configuration program configures the security policy to allow the process access to the specified ranges of values for the resource. In this way, a security configuration program in accordance with an embodiment of the present invention allows a user to configure and extend a security policy without special knowledge of the security policy language. | 2008-08-28 |
20080209536 | Updating Parameters in a Bridged Multistandard Home Network - The invention relates to the field of home networks, in particular to the connection of two home networks of different types via a gateway. The network appliances in the network of the first type are also intended to be able to control the network appliances in the network of the second type, and vice versa. One problem that occurs when carrying out conversion processes on control messages is that an input parameter which is known in the network of the first type can be changed as required and can also be signaled further within this network, but the associated correspondence in the network of the second type is permanently set, and accordingly cannot be changed. The invention provides a way in which an input parameter such as this can nevertheless be likewise updated in the network of the second type. For this purpose, the network station which relates to the input parameter is first of all logged-off in the network of the second type. The changed input parameter is then converted to the information element in the network of the second type. The network station which relates to the input parameter is then logged on again in the network of the second type. This results in the network stations in the network of the second type being able to newly read the appliance description for the network station which relates to the input parameter. This then also results in the input parameter being updated in the network of the second type. | 2008-08-28 |
20080209537 | Self-Initiated End-to-End Monitoring of an Authentication Gateway - An example embodiment of the present invention provides processes relating to self-initiated end-to-end monitoring for an authentication gateway. In one particular implementation, the authentication gateway periodically creates and stores a temporary logon for access to a network and then sends a message including the temporary logon over a secure connection to a client. When the client receives the temporary logon, the client responds to the message by attempting to access a configurable network site. The authentication gateway redirects the client to a captive portal which prompts the client for a logon and the client enters the temporary logon at the captive portal. Then upon validating the temporary logon against the stored temporary logon, the authentication gateway authorizes access to the network. If the client successfully accesses the site, the client sends a verification report to the authentication gateway indicating successful access. Otherwise, the client reports on the failed access. | 2008-08-28 |
20080209538 | Strategies for Securely Applying Connection Policies via a Gateway - A strategy is described for securely applying connection policies in a system that includes a first entity (e.g., a TS client) connected to a second entity (e.g., a TS server) via a gateway using a remote-operating protocol (e.g., RDP). The strategy involves establishing a first secure channel between the gateway and the TS server and transmitting policy information from the gateway to the TS server. The strategy then involves deactivating the first secure channel and setting up a second secure channel between the TS client and the TS server. The strategy uses the second secure channel to transmit RDP data from the TS client to the TS server. The TS server uses the previously-transmitted policy information to determine whether to enable or disable a feature that affects the TS client, such as device redirection. | 2008-08-28 |
20080209539 | System and method for preventing service oriented denial of service attacks - A method, system, and computer program product for preventing network service attacks, including processing a message to validate the message for message version and syntax via a security firewall; canonicalizing the message and extracting a message header and body via a converter; converting the body into a Patricia Trie via the converter; and validating the header and the converted body for security via a comparator. | 2008-08-28 |
20080209540 | FIREWALL INCLUDING LOCAL BUS - A gateway for screening packets transferred over a network. The gateway includes a plurality of network interfaces, a memory and a memory controller. Each network interface receives and forwards messages from a network through the gateway. The memory temporarily stores packets received from a network. The memory controller couples each of the network interfaces and is configured to coordinate the transfer of received packets to and from the memory using a memory bus. The gateway includes a firewall engine coupled to the memory bus. The firewall engine is operable to retrieve packets from the memory and screen each packet prior to forwarding a given packet through the gateway and out an appropriate network interface. A local bus is coupled between the firewall engine and the memory providing a second path for retrieving packets from memory when the memory bus is busy. | 2008-08-28 |
20080209541 | Computer Network Intrusion Detection System and Method - A method and system for identifying an attacker device attempting an intrusion into a TCP/IP protocol based network that includes a managed device and a security event log. The managed device detects an incoming TCP/IP connection by the attacker device to the network. TCP/IP information relating to the attacker device is extracted from a TCP/IP stack of the managed device. It is ascertained that a port number of the incoming TCP/IP connection is identical to a predefined port number. A performed process includes determining that the incoming TCP/IP connection is a Net BIOS connection that has created an invalid logon by the attacker device. Event log information, which is associated with the detected incoming TCP/IP connection, is retrieved from the security event log. A generated report is generated and stored in a database of the network. The report includes the extracted TCP/IP information and the retrieved event log information. | 2008-08-28 |
20080209542 | Communications Systems Firewall - Methods, apparatus, programs and signals for providing communications network security. The approach is based on using established “standard” protocols, but packets (or cells or frames) are deliberately malformed by the sender, optionally according to a predetermined rule (for example by inverting a packet check digit). A filter forwards only packets identified as being invalid, optionally in accordance with the rule; packets which are valid with respect to the “standard” protocol are dropped. The filter is preferably implemented in hardware to mitigate the risk of its being compromised by a malicious attack. | 2008-08-28 |
20080209543 | Methods, systems, and products for identity verification - Methods, systems, and products are disclosed for identification verification. A signature, representing the presence of a device, is acquired. The signature is compared to a reference signature. When the signature favorably compares to the reference signature, then the identity of a user associated with the device is verified. | 2008-08-28 |
20080209544 | Device security method using device specific authentication - A method for improving security to a computer system, and a computer system with improved security, that performs the steps of interrogating at least one device in communication with the computer system to gather a device identifier uniquely identifying the device, compares the device identifier with a list of identifiers to determine a level of trust, and regulates communication between the device and the computer based upon the level of trust. | 2008-08-28 |
20080209545 | Authentication System, Information Processing Apparatus and Method, Program, and Recording Medium - An authentication system includes a mobile device carried by a user and a sensor sensing the user's biometric information. The mobile device includes a template storage unit storing the user's biometric information as a template, a first mutual authentication unit performing mutual authentication with the sensor via the user's body, and a template transmitter transmitting the stored template to the sensor via the user's body when the sensor is verified as valid. The sensor includes a second mutual authentication unit performing mutual authentication with the mobile device via the user's body, a sensing unit sensing the user's biometric information, a degree-of-match determining unit determining whether the biometric information matches the template, and a control-signal output unit outputting a preset control signal when the mobile device is verified as valid and when the biometric information and the template are determined to match each other. | 2008-08-28 |
20080209546 | EVENT DISPLAY METHOD AND APPARATUS FOR MOBILE TERMINAL - Disclosed is an event display method and apparatus for a mobile terminal, which displays events occurring in a mobile terminal on a multi time graphic (divided into a plurality of time graphics), thereby enabling easy checking and management of various types of events. For this, the event display method includes detecting at least one or more events in a mobile terminal, displaying a multi time graphic divided into a plurality of time graphics on a display screen, and locating the detected events on the multi time graphic. | 2008-08-28 |
20080209547 | Electronic device and information processing method - An electronic device including a non-volatile memory and connectable to an information processing apparatus, including the following elements: a sensor configured to sense biometric information; an authentication unit configured to perform user authentication on the basis of the biometric information sensed by the sensor; a management unit configured to manage a number of authentication failures, the number of authentication failures being the number of times the authentication performed by the authentication unit has failed; and a controller configured to disable the electronic device or delete data stored in the non-volatile memory in a case where the number of authentication failures exceeds a preset threshold number of times. | 2008-08-28 |
20080209548 | Method of and Circuit for Identifying and/or Verifying Hardware and/or Software of an Appliance and of a Data Carrier Cooperating with the Appliance - In a method of and circuit for identifying and/or verifying the hardware and/or software of an appliance and of a data carrier, for example a smartcard, cooperating with the appliance, it is provided that a first unit (E | 2008-08-28 |
20080209549 | COMPUTER READABLE MEDIUM, DOCUMENT PROCESSING APPARATUS, DOCUMENT PROCESSING SYSTEM, DOCUMENT PROCESSING METHOD, AND COMPUTER DATA SIGNAL - A computer readable medium storing a program causing a computer to execute a process for document processing, the process includes: receiving image data obtained by, with an image reading apparatus, reading a document of a predetermined format in which contents of an electronic document stored in a storage portion while being associated with identification information, the identification information, and an entry for additional information are arranged; extracting entered additional information from the entry area of the received image data; and correlating the extracted additional information with an electronic document associated with the identification information. | 2008-08-28 |
20080209550 | Method For Detecting and Reacting Against Possible Attack to Security Enforcing Operation Performed by a Cryptographic Token or Card - The approach defines a protection mechanism against attacks to a security enforcing operation performed by cryptographic token or smart card. It is based on an attack detector which signals the main elaboration or processing system regarding a potential attack situation. The approach addresses SIM cloning problems of telecommunications operators who use old and breakable cryptographic algorithms such as the COMP-128 and do not want to invest in updating the network authentication systems with more resistant authentication cryptographic algorithms. The approach may be applicable to the typical telecommunications operator in an emerging market that does not use state of the art technology. | 2008-08-28 |
20080209551 | File Conversion in Restricted Process - Embodiments are described for removing malicious code from a file in a first file format by converting the file into a converted file of a second file format. In embodiments, converting the file eliminates malicious code embedded within the file from being stored in the converted file. The conversion is performed within a restricted computer process that has restricted privileges limiting its access to an operating system and an underlying computer system. As a result, even if malicious code embedded within the file executes while the file is being converted into the converted file, the damage to a computer system is mitigated because of the limited privileges provided to the restricted process. | 2008-08-28 |
20080209552 | IDENTIFYING POTENTIALLY OFFENDING CONTENT USING ASSOCIATIONS - Methods for identifying potentially harmful, malicious, or unwanted content based upon associations with known offenders are provided. Executable content associated with a domain is identified. The executable content URL and the domain are compared to URLs/domains known to be associated with malicious content. If the URL and/or the domain has been identified as associated with offending code, the remaining domain contents and any available associated information are examined to identify any referencing domains, referenced domains, linking domains, affiliated entities, etc. Each identified domain, affiliate, etc. is subsequently examined in a similar manner to identify any domain, entity, etc. having an association with malicious content. Each identified domain, entity, etc. is assigned a suspicion level based upon proximity to the source of the offending code. If desired, relationships among the domains, entities, and the like may be relationally mapped to render associations easier to identify. | 2008-08-28 |
20080209553 | Method for protecting data in a hard disk - The present invention discloses a method for protecting data in a hard disk, such that when a computer executes a power-on self test (POST) of a basic input/output system (BIOS), completes initialization of memories and calls an interrupt routine of the BIOS to read a hard disk area after initialization program codes of interface devices of all hard disk are executed, the computer will determine whether or not the hard disk has added a protection description data with a portion that matches with a computer identification code of the computer before accessing data in the hard disk. | 2008-08-28 |
20080209554 | Spam honeypot domain identification - Identification of spam honeypot domains is performed automatically by a system | 2008-08-28 |
20080209555 | Approach for proactive notification of contract changes in a software service - An approach is provided for proactive notification of contract changes in a software service. According to the approach, when the executable code of a composite application operable to access the service is generated, an initial copy of a contract that describes the service is retrieved. A baseline representation of the contract is generated based on the initial copy of the contract. When the composite application is being executed, a determination is made based on the baseline representation whether the contract has experienced any changes. In response to determining that the contract has experienced a change, a notification is sent indicating that the contract has experienced the change. | 2008-08-28 |
20080209556 | METHOD AND DEVICE FOR VERIFICATION OF CODE MODULE IN VIRTUAL MACHINE - A method for pre-verification of a code module when the code module is installed or updated in a virtual machine, comprising: loading codes in the installed or updated code module; performing code verification on the codes in the code module; if the code verification is passed, generating a certificate of the code module; and storing the code module passing the code verification and its certificate. The present invention also discloses a method for verification of a code module at runtime of the code module in a virtual machine, comprising loading codes in the code module; generating a certificate of the code module based on the loaded codes; if the generated certificate of the code module and a pre-stored certificate of the code module are identical, verifying the code module to be valid; otherwise performing a pre-verification on the code module. | 2008-08-28 |
20080209557 | SPYWARE DETECTION MECHANISM - A system and method that facilitates and effectuates detection of malware secreted and/or hidden in plain sight on a machine. The system and method in order to achieve its aims generates a list of all loaded modules, identifies from the list a set of modules common to more than a threshold number of processes, and eliminates from the list those modules included in an authentication list. The resultant list is prioritized based, in one instance, on the number of occurrences a particular module makes in the resultant list, and thereafter the list is distributed analyst workstations. | 2008-08-28 |
20080209558 | Self-defensive protected software with suspended latent license enforcement - A method and system of computer program modules for extending the cover time of protection for a licensed software product, by increasing the difficulty and time required for an attacker to produce a workable cracked version of the program. When an attack is detected, critical information about the effectiveness of the attack are withheld from the attacker by simulating the behavior of a cracked program, thereby inducing the attacker to prematurely consider the attack successful. Latent license enforcement features are provided, whose activation is suspended until predefined environmental conditions are met. | 2008-08-28 |
20080209559 | Method for detecting that a protected software program is cracked - A method for determining if a software program having a protective envelope has been cracked, and signaling an indication thereof. A direct determination is made of whether the protective envelope is intact or has been compromised by an attack, without requiring a license violation to occur. Executable code in the protective envelope generates an envelope confirmation which is validated by executable code in the program itself. Any disabling or separation of the envelope from the program will be detectable by the program at validation time. Provisions are made for a secure envelope confirmation, the use of arguments as input to the confirmation generation, and for incorporating information related to the computer and user to facilitate identifying the attacker. Signaled indications can include network messaging to alert the licensor that the program has been cracked. | 2008-08-28 |
20080209560 | Active intrusion resistant environment of layered object and compartment key (airelock) - A secure infrastructure system and method with user transparent signaling for communicating detection of signals at a network node having characteristics of a potential attack and for controlling communications at a node from another node in response to the user transparent signals. A processor is connected to routers and the network through an encryption engine and includes a manager object to issue control commands to nodes of a locally lower hierarchical tier and managed objects to detect potential attacks and exercise control over the routers responsive to signals from a node of a locally higher hierarchical tier. Faults or potential attacks are compartmentalized to a node or sector of the network and isolated while normal communications are continued over redundant network links. | 2008-08-28 |
20080209561 | METHOD, COMPUTER SOFTWARE, AND SYSTEM FOR PROVIDING END TO END SECURITY PROTECTION OF AN ONLINE TRANSACTION - A method for implementing an online transaction security product includes downloading an online transaction security product program from a web site to an information handling system. The security product program includes an anti-malicious code program configured to detect malicious code on the information handling system. Lastly, the security product program is executed, wherein the anti-malicious code program of the security product program operates to detect malicious code on the information handling system. | 2008-08-28 |
20080209562 | Metamorphic Computer Virus Detection - The executions of computer viruses are analyzed to develop register signatures for the viruses. The register signatures specify the sets of outputs the viruses produce when executed with a given set of inputs. A virus detection system (VDS) ( | 2008-08-28 |
20080209563 | Runtime Security and Exception Handler Protection - In various embodiments, redirection techniques can be utilized to protect against insecure functionality, to mitigate scripting vulnerabilities, and to protect vulnerable exception handlers. In at least some embodiments, a program can be protected from a security vulnerability by using a runtime shield which changes the behavior of the program while it is running. The shield effectively provides a redirection solution that addresses the vulnerability while, at the same time, does not alter the particular program's executable code. | 2008-08-28 |
20080209564 | Security protection for a customer programmable platform - A method of preventing a customer programmable device from causing security threats to itself or to a communication system is provided. The method includes establishing one or more thresholds by programming or configuring of the device, detecting whether one or more of the thresholds have been exceeded using one or more detection mechanisms, and taking action in response to each threshold that has been exceeded. | 2008-08-28 |
20080209565 | SECURITY MATURITY ASSESSMENT METHOD - In general, the invention relates to a method for assessing an information security policy and practice of an organization. The method includes collecting information about the information security policy and practice of the organization, generating a rating for each of a plurality of information security items using a security maturity assessment matrix and the collected information, and generating a graphical assessment of the ratings. The security maturity assessment matrix includes a first dimension and a second dimension, where the first dimension corresponds to the information security items and the second dimension corresponds to maturity levels. Further, each rating is derived using the first dimension and the second dimension. | 2008-08-28 |
20080209566 | Method and System For Network Vulnerability Assessment - The present invention relates to a simultaneous system for finding and assessing vulnerabilities in a network, which comprises: A. A mapping unit for: (a) scanning the network, and each time a new element is found, reporting its IP address to a profiling unit; (b) sequentially receiving from the profiling unit profile records of said newly found elements; (c) sequentially extracting tables from those elements which their profile record indicates that they are of the network equipment type; and (d) sequentially reporting to a modeling and simulating unit topology records which include said found IPs, and for those elements being of a network equipment type, said topology records also include said extracted tables; B. A profiling unit for sequentially receiving IP addresses of network elements from the mapping unit, investigating each of said elements, forming a profile record for each of said elements, and sequentially transferring said profile records to both the mapping unit and to a vulnerability assessment unit; C. A vulnerability assessment unit for: (a) sequentially receiving profile records from the profiling unit; (b) determining a list of those vulnerability tests that have to be performed on each element; (c) performing for each element those vulnerability tests that are included in its corresponding list, and determining for each test a passed or failed result; and (d) sequentially reporting to an modeling and simulation unit for each performed test, the IP of the element, the identity code of the element, and the passed or failed result; and D. A modeling and simulation unit for: (a) sequentially receiving topology records from the mapping unit, and each time a topology record is received, adding or subtracting respectively the corresponding element from a model of the network which is maintained at the modeling and simulation unit; (b) sequentially receiving from the vulnerability assessment unit vulnerability test (VT) results; and (c) sequentially analyzing the model currently existing at the modeling and simulation unit for the possibility of exploiting vulnerabilities of the network. | 2008-08-28 |
20080209567 | ASSESSMENT AND ANALYSIS OF SOFTWARE SECURITY FLAWS - Security assessment and vulnerability testing of software applications is performed based at least in part on application metadata in order to determine an appropriate assurance level and associated test plan that includes multiple types of analysis. Steps from each test are combined into a “custom” or “application-specific” workflow, and the results of each test may then be correlated with other results to identify potential vulnerabilities and/or faults. | 2008-08-28 |
20080209568 | PRESERVING PRIVACY OF DATA STREAMS USING DYNAMIC CORRELATIONS - Disclosed is a method, information processing system, and computer readable medium for preserving privacy of nonstationary data streams. The method includes receiving at least one nonstationary data stream with time dependent data. Calculating, for a given instant of sub-space of time, A set of first-moment statistical values is calculated, for a given instant of sub-space of time, for the data. The first moment statistical values include a principal component for the sub-space of time. The data is perturbed with noise along the principal component in proportion to the first-moment of statistical values so that at least part of a set of second-moment statistical values for the data is perturbed by the noise only within a predetermined variance. | 2008-08-28 |
20080209569 | INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSOR, IMAGE FORMING APPARATUS, AND INFORMATION PROCESSING METHOD - An information processing system including multiple apparatuses capable of executing one or more applications and an information processor connected to the apparatuses through a first network is disclosed. The information processing system includes a license status information obtaining part configured to obtain the license status information of the applications installed in each of the apparatuses from the corresponding apparatuses through the first network, a license data obtaining part configured to obtain license data authorizing usage of the applications from a computer connected through a second network based on the license status information, and a license data delivery part configured to deliver the license data to each of the apparatuses. | 2008-08-28 |
20080209570 | Systems, Methods, And A Storage Medium For Storing and Securely Transmitting Digital Media Data - Systems, methods, and a storage medium for storing and securely transmitting digital media data in a networked system are provided. The method includes determining an amount of memory for storing the digital media data. The method further includes querying a plurality of network computers to determine an amount of available memory in a plurality of memory storage devices associated with the plurality of network computers. The method further includes receiving the digital media data and partitioning the digital media data into a plurality of digital media data sets. The method further includes encrypting the plurality of digital media data sets into a plurality of encrypted digital media data sets using at least one encryption key value. The method further includes storing the plurality of encrypted digital media data sets in at least two of the plurality of memory storage devices associated with the plurality of network computers. The method further includes retrieving the plurality of encrypted digital media data sets and transmitting the plurality of encrypted digital media data sets to a decryption device. Finally, the method includes decrypting the plurality of encrypted digital media data sets at the decryption device using at least one encryption key value to obtain the digital media data. | 2008-08-28 |
20080209571 | Device for Secure Access to Digital Media Contents, Virtual Multi-Interface Driver and System for Secure Access to Digital Media Contents - A device for secure access to digital media contents, the device comprising an access means for accessing digital media contents from a data source and a reader for authenticating a user, the authentication being performed by checking some authentication data. An internal communication path between the access means and the reader is not directly accessible from outside the device. | 2008-08-28 |
20080209572 | Data Processing System, Data Processing Method, and Management Server - A technique is provided for maintaining the security of the secret data. | 2008-08-28 |
20080209573 | METHODS AND SYSTEMS FOR DISTRIBUTING ADVERTISEMENT-SUPPORTED SOFTWARE WHILE ENSURING CERTAIN SOFTWARE FREEDOMS BY LICENSE - Embodiments related generally to a method of delivering software. The method includes providing the software that includes an advertising module. The software is distributed under a license, which requires the advertising module to be distributed and active with the software. The license may also permit modification of the software and/or redistribution of the software under similar licensing terms. | 2008-08-28 |
20080209574 | Partitioning data on a smartcard dependent on entered password - In one embodiment, an apparatus and method for partitioning data on a smartcard dependent on an entered password are disclosed. In one embodiment, the method includes maintaining multiple containers in a smartcard, associating a different personal identification number (PIN) with each of the multiple containers, and accessing contents of a container when an associated PIN for the container is provided by a user of the smartcard. Other embodiments are also described. | 2008-08-28 |
20080209575 | License Management in a Privacy Preserving Information Distribution System - A system and method for transferring licenses from a first user to one or several other users in an information distribution system, while providing privacy for said users. The level of privacy is enhanced by the license format and the use of a master license, an anonymous license and by the inclusion of a revocation lists in the certificate corresponding to a license. | 2008-08-28 |
20080209576 | PREVENTION OF SOFTWARE PIRACY USING UNIQUE INTERNAL INTELLIGENCE WITH EVERY SOFTWARE APPLICATION COPY - Each copy of a software package utilizing this invention would contain unique self knowledge, the method of interpreting the self knowledge being based upon the self knowledge contents itself, using one or more internal characters, strings of characters and tables of one or more characters meant for self-recognition, that are in themselves unique to each and every copy of a software application product that employs this invention, along with dynamically created actuation codes that would work only for the intended unique copy of the said software package. | 2008-08-28 |
20080209577 | Method of Controlled Access to Content - A method of controlled access to content, comprising joining an access sharing network, obtaining a content item from the access sharing network which requires access control data to enable playback, obtaining the access control data, determining from the access control data that a particular other device is authorized to play back the content item, and enabling playback of the content item in accordance with the access control data upon a positive determination that said other device is a member of said access sharing network. Preferably the access control data is used also during a predetermined period of time after making a determination that said other device has ceased to be a member of the access sharing network. Also a device (101) configured to carry out the method. | 2008-08-28 |
20080209578 | Protecting system management mode (SMM) spaces against cache attacks - A computing system may comprise a processor and a memory controller hub coupled by an external bus such as the front side bus. The processor may also comprise a cache. The processor may operate in SMM and the memory coupled to the memory controller hub may comprise SMM spaces such as compatible, HSEG, and TSEG areas. A software-based attack may write malicious instructions into the cache at an address corresponding to the SMM spaces. The illegal processor memory accesses that occur entirely inside the processor caches due to the cache attack may be forced to occur on the external bus. The memory controller hub may be capable of handling the memory accesses occurring on the external bus thus, protecting the SMM spaces against cache attack. | 2008-08-28 |
20080209579 | Electro-Mechanical System For Non-Duplication of Operating System - An electromechanical system consists of a memory storage unit in which the licensed operating system is stored. The function of this device is to recognize the requested data and thereby allow the operating system from the memory storage unit according to the instructions set to this device. It is an effective means for protecting the operating system in the device from non-duplication. The operating system present in the memory storage unit is constructed as license specific. | 2008-08-28 |
20080209580 | Mouse developing visceral fat type obesity and diabetes - An object of the present invention is to provide a mouse which has the characteristics of early developing visceral fat type obesity and also has concurrent diabetes and hyperlipemia and in which the trait is genetically established and recessively inherited. An ICR-derived mouse strain, Daruma, spontaneously developing obesity, exhibiting autosomal recessive inheritance for the trait of spontaneously developing obesity, and becoming obese only in the homozygous type is provided. | 2008-08-28 |
20080209581 | Induction of exon skipping in eukaryotic cells - Described is a method for at least in part decreasing the production of an aberrant protein in a cell, the cell comprising pre-mRNA comprising exons coding for the protein, by inducing so-called exon skipping in the cell. Exon-skipping results in mature mRNA that does not contain the skipped exon, which leads to an altered product of the exon codes for amino acids. Exon skipping is performed by providing a cell with an agent capable of specifically inhibiting an exon inclusion signal, for instance, an exon recognition sequence, of the exon. The exon inclusion signal can be interfered with by a nucleic acid comprising complementarity to a part of the exon. The nucleic acid, which is also herewith provided, can be used for the preparation of a medicament, for instance, for the treatment of an inherited disease. | 2008-08-28 |
20080209582 | Soybean Variety XB40K07 - According to the invention, there is provided a novel soybean variety designated XB40K07. This invention thus relates to the seeds of soybean variety XB40K07, to the plants of soybean XB40K07 to plant parts of soybean variety XB40K07 and to methods for producing a soybean plant produced by crossing plants of the soybean variety XB40K07 with another soybean plant, using XB40K07 as either the male or the female parent. | 2008-08-28 |
20080209583 | Cucumber Hybrid Excelsior - Hybrid cucumber cultivars designated ‘Excelsior’, ‘15620’, ‘15660’, and ‘15597’, which are the first pickling cucumbers suitable for a vertical growing system under covered cultivation, are disclosed. The invention relates to the seeds of hybrid cucumber cultivars ‘Excelsior’, ‘15620’, ‘15660’ and ‘15597’, to the plants of hybrid cucumber cultivars ‘Excelsior’, ‘15620’, ‘15660’ and ‘15597’. The invention also relates to methods for producing a cucumber plant, either inbred or hybrid, by crossing the hybrid cultivar ‘Excelsior’ with itself or another cucumber cultivar, by crossing the hybrid cultivar ‘15620’ with itself or another cucumber cultivar, by crossing the hybrid cultivar ‘15660’ with itself or another cucumber cultivar, and by crossing the hybrid cultivar ‘15597’ with itself or another cucumber cultivar. The invention further relates to methods for producing other cucumber cultivars derived from the hybrids ‘Excelsior’, ‘15620’, ‘15660’, and ‘15597’. The invention also relates to pickling cucumbers suitable for vertical growing systems under covered cultivation. | 2008-08-28 |
20080209584 | Pepper Plants Having Fruit With Altered Vitamin Content - The present invention provides pepper plants having edible fruit with altered vitamin content, specifically fruit comprising an elevated content of vitamin E, further comprising at least one of an elevated content of pro-vitamin A, an elevated content of vitamin C and combinations thereof. The concentration of vitamin E is at least 5 mg/100 g fresh weight, and the plants are selected to be lacking molecular markers linked to undesirable traits. | 2008-08-28 |
20080209585 | GENES WHICH PRODUCE STAYGREEN CHARACTERISTICS IN MAIZE AND THEIR USES - The present invention is directed to plant genetic engineering. In particular, it is directed to producing green leaves in maize through inhibition of ethylene. The genes involved in producing this phenotype include 1-Aminocyclopropane-1-Carboxylate (“ACC”) synthase, ACC oxidase, ACC deaminase, ethylene response sensor (“ERS”), ethylene resistant (“ETR”), and ethylene insensitive (“EIN”). | 2008-08-28 |
20080209586 | NOVEL TOBACCO COMPOSITIONS AND METHODS OF MAKING - The present disclosure describes tobacco varieties having reduced levels of DVTs, methods of making such varieties, and tobacco compositions including such varieties. | 2008-08-28 |
20080209587 | Methods and compositions for using zinc finger endonucleases to enhance homologous recombination - Embodiments relate to methods of generating a genetically modified cell. The methods can include providing a primary cell containing an endogenous chromosomal target DNA sequence in which it is desired to have homologous recombination occur. The methods also can include providing a zinc finger endonuclease (ZFE) that includes an endonuclease domain that cuts DNA, and a zinc finger domain that includes a plurality of zinc fingers that bind to a specific nucleotide sequence within the endogenous chromosomal target DNA in the primary cell. Further, the methods can include contacting the endogenous chromosomal target DNA sequence with the zinc finger endonuclease in the primary cell such that the zinc finger endonuclease cuts both strands of a nucleotide sequence within the endogenous chromosomal target DNA sequence in the primary cell, thereby enhancing the frequency of homologous recombination in the endogenous chromosomal target DNA sequence. The methods also include providing a nucleic acid comprising a sequence homologous to at least a portion of said endogenous chromosomal target DNA such that homologous recombination occurs between the endogenous chromosomal target DNA sequence and the nucleic acid. | 2008-08-28 |
20080209588 | Expression Cassettes For Seed-Preferential Expression In Plants - The present invention relates to expression cassettes comprising transcription regulating sequences with seed-preferential or seed-specific expression profiles in plants obtainable from | 2008-08-28 |
20080209589 | Soybean Cultivar S060077 - A soybean cultivar designated S060077 is disclosed. The invention relates to the seeds of soybean cultivar S060077, to the plants of soybean S060077, to plant parts of soybean cultivar S060077 and to methods for producing a soybean plant produced by crossing soybean cultivar S060077 with itself or with another soybean variety. The invention also relates to methods for producing a soybean plant containing in its genetic material one or more transgenes and to the transgenic soybean plants and plant parts produced by those methods. This invention also relates to soybean cultivars or breeding cultivars and plant parts derived from soybean variety S060077, to methods for producing other soybean cultivars, lines or plant parts derived from soybean cultivar S060077 and to the soybean plants, varieties, and their parts derived from use of those methods. The invention further relates to hybrid soybean seeds, plants and plant parts produced by crossing the cultivar S060077 with another soybean cultivar. | 2008-08-28 |
20080209590 | Soybean Cultivar S060293 - A soybean cultivar designated S060293 is disclosed. The invention relates to the seeds of soybean cultivar S060293, to the plants of soybean S060293, to plant parts of soybean cultivar S060293 and to methods for producing a soybean plant produced by crossing soybean cultivar S060293 with itself or with another soybean variety. The invention also relates to methods for producing a soybean plant containing in its genetic material one or more transgenes and to the transgenic soybean plants and plant parts produced by those methods. This invention also relates to soybean cultivars or breeding cultivars and plant parts derived from soybean variety S060293, to methods for producing other soybean cultivars, lines or plant parts derived from soybean cultivar S060293 and to the soybean plants, varieties, and their parts derived from use of those methods. The invention further relates to hybrid soybean seeds, plants and plant parts produced by crossing the cultivar S060293 with another soybean cultivar. | 2008-08-28 |
20080209591 | Mutant Allele of Cucurbita Pepo - The present invention relates to a | 2008-08-28 |
20080209592 | SOYBEAN CULTIVAR 6600375 - A soybean cultivar designated 6600375 is disclosed. The invention relates to the seeds of soybean cultivar 6600375, to the plants of soybean 6600375, to plant parts of soybean cultivar 6600375 and to methods for producing a soybean plant produced by crossing soybean cultivar 6600375 with itself or with another soybean variety. The invention also relates to methods for producing a soybean plant containing in its genetic material one or more transgenes and to the transgenic soybean plants and plant parts produced by those methods. This invention also relates to soybean cultivars or breeding cultivars and plant parts derived from soybean variety 6600375, to methods for producing other soybean cultivars, lines or plant parts derived from soybean cultivar 6600375 and to the soybean plants, varieties, and their parts derived from use of those methods. The invention further relates to hybrid soybean seeds, plants and plant parts produced by crossing the cultivar 6600375 with another soybean cultivar. | 2008-08-28 |
20080209593 | SOYBEAN CULTIVAR 6421326 - A soybean cultivar designated 6421326 is disclosed. The invention relates to the seeds of soybean cultivar 6421326, to the plants of soybean 6421326, to plant parts of soybean cultivar 6421326 and to methods for producing a soybean plant produced by crossing soybean cultivar 6421326 with itself or with another soybean variety. The invention also relates to methods for producing a soybean plant containing in its genetic material one or more transgenes and to the transgenic soybean plants and plant parts produced by those methods. This invention also relates to soybean cultivars or breeding cultivars and plant parts derived from soybean variety 6421326, to methods for producing other soybean cultivars, lines or plant parts derived from soybean cultivar 6421326 and to the soybean plants, varieties, and their parts derived from use of those methods. The invention further relates to hybrid soybean seeds, plants and plant parts produced by crossing the cultivar 6421326 with another soybean cultivar. | 2008-08-28 |
20080209594 | Soybean Cultivar 6733322 - A soybean cultivar designated 6733322 is disclosed. The invention relates to the seeds of soybean cultivar 6733322, to the plants of soybean 6733322, to plant parts of soybean cultivar 6733322 and to methods for producing a soybean plant produced by crossing soybean cultivar 6733322 with itself or with another soybean variety. The invention also relates to methods for producing a soybean plant containing in its genetic material one or more transgenes and to the transgenic soybean plants and plant parts produced by those methods. This invention also relates to soybean cultivars or breeding cultivars and plant parts derived from soybean variety 6733322, to methods for producing other soybean cultivars, lines or plant parts derived from soybean cultivar 6733322 and to the soybean plants, varieties, and their parts derived from use of those methods. The invention further relates to hybrid soybean seeds, plants and plant parts produced by crossing the cultivar 6733322 with another soybean cultivar. | 2008-08-28 |
20080209595 | COMPOSITIONS AND METHODS FOR THE TARGETED INSERTION OF A NUCLEOTIDE SEQUENCE OF INTEREST INTO THE GENOME OF A PLANT - Methods for the targeted integration of nucleotide sequences into a plant are provided. Transfer cassettes comprising nucleotide sequences of interest flanked by non-identical recombination sites are used to transform a plant comprising a target site. The target site contains at least a set of non-identical recombination sites corresponding to those on the transfer cassette. Exchange of the nucleotide sequences flanked by the recombination sites is effected by a recombinase. | 2008-08-28 |
20080209596 | PLANT SUGAR TRANSPORT PROTEINS - This invention relates to an isolated nucleic acid fragment encoding a sugar transport protein. The invention also relates to the construction of a chimeric gene encoding all or a portion of the sugar transport protein, in sense or antisense orientation, wherein expression of the chimeric gene results in production of altered levels of the sugar transport protein in a transformed host cell. | 2008-08-28 |
20080209597 | Transgenic Cells Expressing Glucosyltransferase Nucleic Acids - The invention relates to transgenic cells which have been transformed with nucleic acids encoding glycosyltransferase polypeptides (GTases) and vectors for use in transformation of said cells. | 2008-08-28 |
20080209598 | Plant Cultivation Method - Method for the production of young plants and/or micro-parent stock of 5 herbaceous ornamentals. Method for the production of young plants and/or of micro-parent stock of herbaceous ornamentals, which comprises an in vitro culture phase during which explants obtained from parent stock of species to be propagated, or derivatives of these explants, are subjected to micropropagation which is carried out under suitable conditions and on suitable culture media, in order to produce microplantlets which, when subjected to an in vivo culture phase, are intended to develop into plants or into micro-parent stock, characterized in that, to carry out said micropropagation: the explants are, under axenic conditions, in the dark and for a suitable period of time, placed on a proliferation medium which is composed to suit each plant species to be propagated, so as to induce the formation of white filaments which comprise axillary buds, each of the white filaments is divided into a plurality of pieces, each of 20 which comprises an axillary bud, and said pieces are, in the light, under axenic conditions and for a suitable period of time, placed into a rooting medium, which allows each axillary bud to produce a micro-plantlet which has roots. | 2008-08-28 |
20080209599 | Miniature rose plant named 'Meimarivon' - A new and distinct Miniature rose plant is provided which abundantly forms on a substantially continuous basis attractive pink blossoms. A low and compact growth habit is displayed that is well adapted for pot culture. The dense glossy green foliage contracts nicely with the pink blossom coloration. The tolerance to diseases is very good, particularly with respect to Oidium. | 2008-08-28 |
20080209600 | Blueberry plant named 'Centra Blue' - A new and distinct rabbiteye blueberry variety is described. The variety results from selection among a population of seedlings derived from crossing the blueberry varieties known as ‘Centurion’ (not patented) and ‘Rahi’ (not patented). The fruit of this new variety has an attractive appearance characterised by outstanding fruit quality with a good bloom and little grittiness, and an exceptionally late fruiting season. The new variety appears suitable for the late fresh fruit market and has been named ‘Centra Blue’. | 2008-08-28 |
20080209601 | APPLE TREE NAMED 'PB-148' - A new and distinct variety of apple tree | 2008-08-28 |
20080209602 | Apple tree variety named 'Scilate' - A new and distinct apple tree variety is described. The variety results from selection among a population of seedlings derived from crossing the apple varieties known as ‘Royal Gala’ (U.S. Plant Pat. No. 4,121) and ‘Braeburn’ (not patented). The fruit of the apple tree of this new variety has an attractive appearance characterised by its red colour and obvious lenticels and is notable for its excellent eating quality. The new variety has been named ‘Scilate’. | 2008-08-28 |
20080209603 | Grapevine plant named 'Cara Seedless' - A new and distinct variety of grapevine is provided which abundantly forms attractive medium-to-large seedless berries having a dark eggplant skin coloration in compact clusters. The fruit displays a sweet crisp flavor and is firm in texture. The fruit commonly is ready for harvest during late September to early October in the San Joaquin Valley of Central California, U.S.A., and displays good eating qualities as a table grape. The fruit firmness renders the fruit well amenable for handling, shipping, and storage. | 2008-08-28 |
20080209604 | Jamesbrittenia plant named 'DANBRIT4' - A new and distinct | 2008-08-28 |
20080209605 | ANGELONIA PLANT NAMED 'CAS WHIT07' | 2008-08-28 |
20080209606 | Argyranthemum plant named 'Danargy20' - A new and distinct | 2008-08-28 |