42nd week of 2009 patent applcation highlights part 51 |
Patent application number | Title | Published |
20090260027 | Monitoring TV Viewing with Programs from Cable/Satellite Providers - A technique is disclosed for monitoring viewership of programs being performed on reproduction equipment in response to a received broadcast signal. The technique comprises receiving the broadcast signal to provide a received output signal, adding a selected monitoring code to the received output signal to provide a combined output signal, inputting the received output signal to reproduction equipment for performing programs in the broadcast signal and for transmitting the monitoring code, detecting the transmitted monitoring code with a code detector positioned in proximity to the reproduction equipment; and providing viewership information based on the monitoring code. | 2009-10-15 |
20090260028 | VIDEO BUFFER FOR USE IN ADVERTISEMENT DISPLAYS - A video buffer system and method for use with advertising display systems. Programming packets are stored at the video buffer and displayed in a continuous loop until the next programming packet has been received and stored. The video buffer system allows for displays to continuously display advertisements during data stream interruption or delay. The video buffer system also records the number of times an advertisement has been played to ensure accurate billing for the advertisement. | 2009-10-15 |
20090260029 | Multi-media target marketing (formerly viewer controlled television target marketing) - A computer (software and/or hardware) controlled electronic device, either freestanding or device controlled, that allows a television viewer, internet user or cellular phone user to choose what kind of commercial or advertising content to allow into their home or onto their device. | 2009-10-15 |
20090260030 | DYNAMIC ADVERTISEMENT STREAM REPLACEMENT - Mechanisms are provided for replacing default advertisement streams in a media stream with replacement advertisement streams. User profile information is obtained for a particular user and/or device. A default advertisement stream is identified and replaced with advertisement streams selected using the user profile information. Timestamp information and sequence number information is maintained to allow uninterrupted delivery of the modified media stream while customizing media streams for particular users. | 2009-10-15 |
20090260031 | METHOD AND APPARATUS FOR REPRODUCING CONTENT - A content reproducing method and apparatus that can provide an Internet protocol television (IPTV) based on electronic program guide (EPG) data. The content reproducing method includes detecting information of a program that a user is currently viewing or that the user has recently viewed from electronic program guide (EPG) data, receiving a content list from an Internet protocol television (IPTV) service server based on the detected program information, displaying the received content list, selecting content based on the displayed content list, and receiving and reproducing the selected content from the IPTV service server. | 2009-10-15 |
20090260032 | METHOD AND SYSTEM FOR DISCOVERING STREAMING SERVICES, AND SERVICE DISCOVERY APPARATUS - The present disclosure provides a method and system for discovering streaming services, and a service discovery apparatus. The method includes steps as follows: The IMS network side generates streaming service information, and sends the information to a UE according to the information of the UE accessing the IMS network. The method, system and service discovery apparatus are based on IMS technologies. The service discovery unit may send the streaming service information to the UE automatically according to the information of the UE accessing the IMS network, without requiring requests from the UE or the address of the EPG generating unit. | 2009-10-15 |
20090260033 | APPARATUS AND METHOD FOR IMPLEMENTING IPTV SERVICE - Systems, apparatuses, and methods for implementing IPTV service are disclosed according to the present invention. In particular, a user equipment initiates an IPTV service request to an IPTV application subsystem in an IMS session. The IPTV application subsystem acquires content description from a service selection function entity according to the IPTV service request, and enables a multimedia delivery subsystem to provide content to the user equipment based on the acquired content description. According to the present invention, a content description function entity is provided in the system. The content description function entity is able to provide content description which may be utilized in the IMS session procedure for the purpose of implementing IPTV service. | 2009-10-15 |
20090260034 | TV USER INTERFACE FOR VIEWING SELECTED SUB-GROUPS OF CHANNELS - Intuitive user interfaces are disclosed for a TV showing a favorites channel pane that can transition to a channel history pane, etc. in response to remote control commands. | 2009-10-15 |
20090260035 | SYSTEM AND METHOD FOR DISPLAYING AND NAVIGATING A GRAPHICAL TWO-DIMENSIONAL ARRAY OF A PLURALITY OF AVAILABLE CHANNELS - The subject application is directed to a system and method for displaying and navigating a graphical two-dimensional array of a plurality of available channels on an associated display unit. A two-dimensional array of channel boxes is first generated on an associated display. Input signals are then received corresponding to a respective plurality of available channels. At least one of the received input signals is then parsed to acquire channel identification data indicating at least one channel associated with the parsed signal. Image data associated with the indicated channel is then captured. Thereafter, at least one channel box is populated in the array with the acquired identification data and the captured image data. | 2009-10-15 |
20090260036 | MULTIPLE DATABASE, USER-CHOICE-COMPILED PROGRAM AND EVENT GUIDE - An electronic programming guide generator utilizes filters to select only programming filtered to display in an electronic programming guide display. | 2009-10-15 |
20090260037 | APPARATUS AND METHOD FOR CONSTRAINED SELECTION OF FAVORITE CHANNELS - An interactive program guide system is provided in which an interactive program guide offers a user access to content from multiple available media types. The program guide system provides for designating a preferred media type which reflects the user's interests. The program guide system also provides the user with the option of designating favorite channels. The user is subsequently allowed to navigate among only favorite channels of the preferred media type. | 2009-10-15 |
20090260038 | MERGING ELECTRONIC PROGRAM GUIDE INFORMATION - Techniques are disclosed herein for merging EPG data associated with a variety of program sources. In one aspect, EPG data is accessed for different program sources and rules are selected that define how entries in the EPG data are to be merged. The rules may be selected based on whether the EPG data was collected in-band or out-of-band. In addition, the merging rules can be dependent on the program source, which allows the flexibility of applying different rules to different program sources. The EPG data from the different program sources is merged into a single EPG based on the selected rules. | 2009-10-15 |
20090260039 | METHOD, SYSTEM AND DEVICE FOR TEMPLATE REPLACEMENT - The present invention discloses a method for template replacement, including: transmitting, by a user terminal, a template replacement request to a central node management device; and controlling, by the central node management device, an edge node device to replace the template for the user terminal. The present invention further discloses a template replacement system, a central node management device and an edge node device. The consumption of network transmission resources and user terminal storage resources during template replacement is reduced, which allows the entire template replacement system to have a higher cost performance. | 2009-10-15 |
20090260040 | PROVIDING MULTIPLE TELEVISION CHANNEL PREVIEWING OF COMMERCIAL FREE CONTENT - A system for capturing commercial free video samples. In response to receiving multiplexed channels input from a television service provider, channel preferences and general preferences are applied. A channel number is selected based on the channel preferences and general preferences. Channel guide information is collected for the selected channel number. It is determined whether a video sample for the selected channel number will complete before a program change based on the channel guide information. In response to determining that the video sample for the selected channel number will complete before a program change, a capture of a video sample from the selected channel number is started. A content of the capture of the video sample is analyzed for commercial content. Then, in response to determining that the content of the capture of the video sample does not include commercial content, the video sample is saved in a data buffer for use by an active icons display and control function upon viewer request. | 2009-10-15 |
20090260041 | Transmitting and Receiving Control Information for Use with Multimedia Streams - First control information, generated according to a first protocol version, for configuring an audiovisual device to present a multimedia stream, may be generated. A first data structure specifying that the first control information is of the first protocol version may be generated. A plurality of packets, including a multimedia stream, the first control information, and the first data structure, may be generated and transmitted. Second control information, generated according to a second protocol version, for configuring an audiovisual device to present a multimedia stream, may be generated. The first data structure may be modified to include information about the second control information. A second plurality of packets, including the modified first data structure, the first control information, a multimedia stream specified by the first control information, the second control information, and a multimedia stream specified by the second control information, may be generated. | 2009-10-15 |
20090260042 | UPnP/DLNA Compliant MR-DVR - A method for operably connecting MR-DVR legacy systems with DLNA/UPnP compliant devices. An embodiment comprises an MR-DVR server translating DLNA/UPnP compliant protocols/data format to legacy protocols/data format used by MR-DVR legacy client devices. | 2009-10-15 |
20090260043 | WIRELESS TRANSMISSION SYSTEM FOR WIRELESSLY CONNECTING SIGNAL SOURCE APPARATUS AND SIGNAL SINK APPARATUS - An adapter apparatus wirelessly transmits a TMDS signal to an adapter apparatus using a first radio channel, wirelessly transmits a DDC downstream signal and a CEC downstream signal to an adapter apparatus using a second radio channel, and receives a radio signal including a DDC upstream signal and a CEC upstream signal from the adapter apparatus using the second radio channel. The adapter apparatus receives the TMDS signal using the first radio channel, receives the radio signal including the DDC downstream signal and the CEC downstream signal using the second radio channel, and wirelessly transmits the DDC upstream signal and the CEC upstream signal to the adapter apparatus using the second radio channel. | 2009-10-15 |
20090260044 | INTEGRATION SYSTEM OF DIGITAL CONTENT AND SERVICES - An integration system of the digital content and services includes a home server and a digital media player terminal. The home server is configured to provide media content. The home server includes a favorite content recording engine for collecting favorite content. The home server is capable of receiving updated content from a remote digital content push engine. The digital media player terminal is connected to the home server. The digital media player is configured for playing the updated content. | 2009-10-15 |
20090260045 | NETWORK OPTIMIZED DISTRIBUTION - A content server is configured to buffer and transmit numerous live media streams to individual devices. The content server analyzes characteristics associated with the live media streams to determine timing and sequence number information. Other characteristics such as network congestion metrics, device buffer usage metrics, etc., can also be evaluated. Combined peak transmission times are determined to allow packets designated for transmission at a bandwidth usage peak to be transmitted earlier in time. Earlier packets are shifted even earlier as sequence numbers allow. This evens out bandwidth usage rates and allows improved live media stream transmission. | 2009-10-15 |
20090260046 | METHOD, APPARATUS, AND SYSTEM FOR REDUNDANCY BACKUP OF VIDEO SERVICES - A method, apparatus and system for redundancy backup of video services are provided. The method includes: receiving a data stream from a video server; stopping delivering the data stream to an Internet Protocol (IP) network if determining that the data stream is abnormal; and triggering the IP network to change delivery of the data stream over to a redundant video server. With the method provided by the present disclosure, when the data stream played by the Near Video on Demand (nVOD) system is detected as abnormal, a route changeover can be completed so that the program stream of a redundant nVOD server is delivered to the IP network. | 2009-10-15 |
20090260047 | BLADE CENTER KVM DISTRIBUTION - A system and method for providing redundant video signals from a server blade in a blade center. A blade center is described that includes a capture system for capturing a video stream off a PCI-x bus in a server blade and delivering the pair of video streams to a midplane in the blade center; and a switch module that inputs the pair of video streams and generates an unroutable video signal and a routable video signal. | 2009-10-15 |
20090260048 | METHOD OF PROVIDING CONTENT AND CONTENT PROVIDING APPARATUS, AND METHOD OF REPRODUCING CONTENT AND CONTENT REPRODUCING APPARATUS - A method of providing content and a content providing apparatus, and a method of reproducing content and a content reproducing apparatus by which content reconstruction information for adjusting a content reproduction time according to a content reproduction environment is generated, and the generated content reconstruction information and the content are then transmitted. | 2009-10-15 |
20090260049 | Automatic drop/house return termination system - The device provides for a detector and switch which allows a signal to be transmitted from the subscriber to the head-end provider, but, in all other circumstances, the device does not allow other signals or ingress to enter the CATV system from the subscriber's house. | 2009-10-15 |
20090260050 | Authenticating device for controlling application security environments - Computer protection is weak with the methods currently available and there are risks of malicious users getting access to computers, corrupting important data, including system data. We are proposing a method for improving access protection, more particularly, by adding a device capable of user authentication that will enable or disable protection for applications as required. The device supports one or more users, none or more user groups, none or one or more Application Security Environments for each user or user group and one or more states for each Application Security Environment. The state of the hardware is manually controlled by the users. Depending on the configuration, each hardware state corresponding to an Application Security Environment corresponds to a set of privileges for processes running in that Application Security Environment while that Application Security Environment is in that state. | 2009-10-15 |
20090260051 | POLICY PROCESSING SYSTEM, METHOD, AND PROGRAM - In a policy handling system performing automatic execution, management, and control of a system, a policy retrieving section ( | 2009-10-15 |
20090260052 | Inter-Process Message Security - An inter-process messaging security management may be provided. A message comprising an operation to be performed may be sent from a process operating in a process chamber to a second process operating in another chamber. Before the message is allowed to be delivered, the validity of the operation contained in the message may be verified and a security policy may be examined to determine whether the message is permitted to be sent from the first process to the second process. If the security policy permits the second process to execute the operation requested by the first process, the message may be delivered to the second process. If the operation is not permitted, the message may not be delivered and an error message may be returned to the first process. | 2009-10-15 |
20090260053 | Data Management in a Computer System - Embodiments of the invention generally provide methods, systems, and articles of manufacture that facilitate classification of a data access authority of unclassified users into one or more categories, and control access of data by the users based on the categories. When an unclassified user is found in an organization chart, one or more classified users near the unclassified user in the data tree may be identified. The unclassified user may be compared to the identified classified users to determine one or more suggested data access categories for classifying the unclassified user. The unclassified user may therefore be classified into one of the suggested data access category based on, for example, user input. | 2009-10-15 |
20090260054 | Automatic Application of Information Protection Policies - The secure application of content protection policies to content. The secure application of content protection polices is accomplished by having an enforcement mechanism monitor policy application points to detect the transfer of content. The enforcement mechanism accesses the content and a determination is made to protect the content. A usage policy is then identified by the enforcement mechanism to apply to the content and the usage policy is then applied to the content, resulting in a usage policy for the content. | 2009-10-15 |
20090260055 | REAL-TIME DATA SHARING AMONG A PLURALITY OF USERS - Described embodiments provide for accessing stored data representing real-time tracking information shared among a plurality of users. First, a user request for access to stored data is identified. A device type associated with the user request is determined, and one or more permissions for the user request are also determined. Based on the one or more permissions determined, a portion of the stored data is provided to the user through one of a plurality of specialized data views. The selected one of the plurality of specialized data views is selected based on the device type. | 2009-10-15 |
20090260056 | Role-Based Authorization Management Framework - A role-based authorization management system maintains an authorization policy store that represents user authorizations to perform operations associated with an application. When a user attempts to perform a function associated with an application, the authorization management system verifies that the user is authorized to perform the requested function. The authorization management system also provides an interface for an application administrator to update role-based user authorization policies associated with one or more applications. | 2009-10-15 |
20090260057 | Method for distributing a list of certificate revocations in a vanet - In a vehicle-to-vehicle wireless communication system utilizing certificates to verify trustworthiness of received communications, a method for distributing a list of certificate revocations to vehicles in the communication system. At least one main station transmits a list of certificate revocations to at least one vehicle and the vehicle thereafter transmits the list of certificate revocations to other vehicles in the communication network. Each of the other vehicles in the communication network updates its list of certificate revocations in response to the receipt of the list of certificate revocations from another vehicle in the system. The other vehicles thereafter transmit their updated list of certificate revocations to other vehicles in the system. | 2009-10-15 |
20090260058 | Validity checking system, validity checking method, information processing card, checking device, and authentication apparatus - OBJECTIVE A user is prevented from inadvertently inputting authentication information to an unauthorized authentication system. In this manner, authentication information leakage is certainly avoided. | 2009-10-15 |
20090260059 | Method and System for Secure Management of Co-Located Customer Premises Equipment - A method, system, and apparatus for managing customer premise equipment according to one embodiment includes establishing a secure connection between a first transport unit and a second transport unit. The secure connection includes an embedded operations channel and is operable to isolate a management plane from a data plane. The method further includes the first transport unit receiving a request for access to the first transport unit from the second transport unit. The method further includes establishing a secure terminal session between the first transport unit and the second transport unit using the embedded operations channel in response to receiving the request for access. The first transport unit then receives a management command from the second transport unit and the first transport unit performs at least one management function in response to receiving the management command. | 2009-10-15 |
20090260060 | RICH MEDIA COLLABORATION SYSTEM - A user annotates a shared document with text, sound, images, video, an e-mail message, graphics, screen snapshots, web site snapshots to share with others. The document and its annotations are stored in a digital object repository to which other users have access. Within the closed collaboration system, only users who are authenticated may upload digital objects, annotate digital objects and view objects and their annotations. The user sends a message to other users to invite them to view the object and its annotations and to add their own annotations. An annotated object generates an alert for all of the invited users. A remote authentication gateway authenticates users and has a repository for user metadata. Digital object repositories are separate from the authentication gateway, thus providing for disintermediation of the user metadata from the digital object data. The collaboration system may be hosted by a third party on a server computer available over the Internet that displays a web site. A user is not required to have collaboration system software on his or her computer and may annotate any image on the web site for later viewing by other users of the web site. | 2009-10-15 |
20090260061 | SYMBIOTIC NETWORK DIGITAL DOCUMENT LAYERING AND/OR STEGANOGRAPHY METHOD, ARTICLE AND APPARATUS - What is provided are methods, articles and apparatuses for digital document layering, watermarking holding messages, and/or general steganography over a symbiotic network. | 2009-10-15 |
20090260062 | REAL-TIME ONLINE COMMUNICATIONS MANAGEMENT - Every day many people use real-time online communication applications in business communications. Although instant message communications can be sent via a secure channel, users can accidentally send instant messages to unintended recipients by typing or pasting text and images. This can lead to unintended information security failures. Implementing functionality to prioritize chat windows within a real-time online communication application reduces the likelihood of sending messages to incorrect recipients. | 2009-10-15 |
20090260063 | IMAGE FORMING SYSTEM AND IMAGE FORMING APPARATUS - An image forming system includes: an authentication server device having user information, for performing a user authentication via a computer network; and an image forming apparatus including: an authentication unit for accessing the authentication server device to perform an authentication processing for a user; and a data storage device for storing therein document data generated by an image forming processing based on the user's operation, and storing document attribute information, which has the same attribute items as a part of, or all of, attribute items of the user information held by the authentication server device, in association with the document data. | 2009-10-15 |
20090260064 | METHOD AND PROCESS FOR REGISTERING A DEVICE TO VERIFY TRANSACTIONS - A user-oriented verification system and method provides for verification and fraud reduction in transactions. Users create verification accounts and register one or more devices with the account. Entity data provided by the user is selectively paired with device identifiers associated with registered devices. The entity/device pairs dictate the type and scope of transactions that may be entered into by each registered device. During a transaction, a requester provides entity/device information collected from a user to the verification system. If the entity/device information matches records stored by the verification system (i.e., the user has previously registered the device and associated selected entity information with the device) then the transaction is verified and notice is provided to the requester. | 2009-10-15 |
20090260065 | Cumulative Login Credit - Login credit is monitored over a credit time period. Continuous invalid login attempts decrease the login credit for the duration of the credit time period. Login credit accumulates with time. If the login credit is less than a credit threshold, login processing is precluded. A common invalid login notification for presentation to a user is generated if login processing is precluded or if login processing indicates that the login credentials are invalid. | 2009-10-15 |
20090260066 | Single Sign-On To Administer Target Systems with Disparate Security Models - A method and apparatus are provided for signing a user into a computer network associated with an automatic contact distribution system. The method includes the steps of providing a sign-on list that identifies a plurality of subsystems of the computer network of the automatic contact distribution system that the user had previously signed onto, detecting the user signing into the system, retrieving the sign-on list and automatically signing the user into each of the plurality of subsystems identified by the list. | 2009-10-15 |
20090260067 | Method and system for legitimate lending and sharing of digital copyrighted content items over a data network - The present invention relates to a method of enabling concurrently lending at least one digital copyrighted content item from one user's terminal to a certain number of other users' terminals over a data network, according to a number of copyright users' licenses of each of said at least one digital copyrighted content item, said method comprises: (a) indexing at least one digital copyrighted content item provided from at least one user's terminal over a data network, giving rise to an items index; (b) receiving a request to lend a digital copyrighted content item to user's terminal over said data network; (c) conducting a search for the requested digital copyrighted content item by means of said items index; (d) if said requested digital copyrighted content item is found by means of said items index, checking whether it is available for lending to said user's terminal, according to a number of available copyright users' licenses of said requested digital copyrighted content item; (e) if said requested digital copyrighted content item is available for lending, then enabling lending it to said user's terminal; and (f) upon receiving another request to lend said digital copyrighted content item, repeating steps ‘d’ and ‘e’, and enabling concurrently lending said copyrighted content item to a certain number of users' terminals until said certain number does not exceed said number of available copyright users' licenses of said digital copyrighted content item. | 2009-10-15 |
20090260068 | Efficient, Peer-to-Peer Captcha-Based Verification and Demand Management for Online Services - A system and method configured that may allow performing a human-computer verification including crediting a verified task from a first user to a second user. In additional embodiments, may allow the user to perform a computer operation that require human-computer verification based upon an amount of credits that the user has been provided. | 2009-10-15 |
20090260069 | IMAGE FORMING SYSTEM AND IMAGE FORMING APPARATUS - An image forming system comprising: a server device including user information, for performing a user authentication via a computer network and for receiving and adding up count data on a user basis; and an image forming apparatus including: a storage unit to which a data area for storing therein the count data including a count value of an occurrence of a predetermined event can be allocated; a login processing unit for determining whether or not to permit a user to log in; a count unit for updating, when the predetermined event occurs based on an operation performed by the user permitted to log in, the count data for the user; and a transmission unit for transmitting, when the user logs out, the count data for the user to the server device. | 2009-10-15 |
20090260070 | Systems and Methods for Secure Sign-Up Procedures for Application Servers in Wired and Wireless Environments - Systems and methods of providing strong authentication for a client device to sign-up with an online service. Authentication can involve verifying user's identity, message authentication, message integrity and nonrepudiation. The security procedures may, in some cases, be sufficient to verify all of these parameters. In other cases, the sign-up procedure needs to be combined with other information in order to verify the user's real identity. | 2009-10-15 |
20090260071 | SMART MODULE PROVISIONING OF LOCAL NETWORK DEVICES - A card-based mechanism can enable users to secure their network by limiting network access to devices to which a card is communicationally connected, the card having been previously provisioned by the user. A trusted computing device can be used to provision a card. Subsequently, the card can be communicationally connected to a card-provisionable device and can use the networking abilities of that device to authenticate itself to the trusted computing device. The card-provisionable device can then be granted access to the network. The card can also be used to provision the device with other information, such as device-specific settings. If necessary, either the card or the trusted computing device can revoke the network access rights of the card-provisionable device without affecting other devices on the network. | 2009-10-15 |
20090260072 | IDENTITY OWNERSHIP MIGRATION - Systems, computer-implemented methods, and computer-readable media for establishing an online account with a resource provider are provided. An authentication token including identification of a user from an authentication server is received. The identification of the user from the authentication token is utilized to establish an online account for the user with the resource provider. Additional credentialing information from the user for the online account is received. The additional information received from the user is associated with the online account for the user with the resource provider. | 2009-10-15 |
20090260073 | COMMUNICATION TERMINAL AND METHOD OF PROVIDING UNIFIED INTERFACE TO THE SAME - A communication terminal and a method of providing a unified natural language interface to the same are disclosed. The method includes: determining, when text information containing many characters is created, whether the text information conforms to one of preset grammatical constraints; extracting, when the text information conforms to one of the grammatical constraints, tokens of one or more of characters from the text information, and extracting, when the text information does not conform to one of the grammatical constraints, one or more characters having an attribute probability higher than a reference probability as a token; and analyzing the extracted tokens to, determine a function to handle the extracted tokens, and executing the determined function based on the extracted tokens. | 2009-10-15 |
20090260074 | SYSTEM AND METHOD FOR APPLICATION LEVEL ACCESS TO VIRTUAL SERVER ENVIRONMENTS - An application level virtual private network (VPN) that provides access for individual applications running on a client computer to physical or virtual servers running in a datacenter is provided. The access connection is secure, automatically setup and does not require changing the network configuration of the client computer. The application running of a client computer, such as a keyboard-video-mouse (KVM), is automatically launched with a single click from the user. | 2009-10-15 |
20090260075 | SUBJECT IDENTIFICATION - A system for authenticating the identity of a subject comprises: means for receiving information on subject behaviour comprising one or more events, means for allocating confidence levels to the event or events comprised in the received behaviour information and for extracting an overall confidence level on the basis of the allocated confidence level or levels and processing means for deciding on the identity of the subject on the basis of the overall confidence level. The system may include a device for collecting information relating to one or more events forming part of the behaviour of a subject and for providing the information to a separate unit to determine the identity of the subject. | 2009-10-15 |
20090260076 | WORKFLOW MANAGEMENT APPARATUS AND WORKFLOW MANAGEMENT METHOD - A server apparatus generates a folder for content to be transmitted from an image processing apparatus, and sets a path of the folder to the image processing apparatus as a destination of sending of the content. The user is allowed to select one destination of sending set in a display panel of the image processing apparatus, and the image processing apparatus sends the content to the selected destination of sending. | 2009-10-15 |
20090260077 | SECURITY-ENHANCED LOG IN - A security-enhanced login technique that provides a convenient and easy-to-use two factor technique to enhance the security of passwords without requiring any changes on the server side of a client-server network. The technique employs a convenient and easy-to-use two-factor technique to generate strong passwords for Web and other applications. In this technique, a convenient or personal device such as a mouse is used as the other factor besides a user password. A secret stored in the mouse or other personal device is hashed together with the password entered by a user and the server ID, to generate a strong, server-specific password which is used to authenticate the user to the server. This password enhancement operation is carried out inside the personal device. | 2009-10-15 |
20090260078 | AUTHENTICATION SYSTEM AND METHOD - An authentication apparatus and technology operable to change a response time based on a degree of authentication failure is disclosed. A degree of authentication failure can be determined in response to an authentication failure. A response time such as an authentication response time can be changed based on the degree of authentication failure. Intervals between entries of a password may be increased logarithmically based on the number of failed login attempts to deter unauthorized access. | 2009-10-15 |
20090260079 | INFORMATION PROCESSING DEVICE, AND METHOD THEREFOR - To provide an information processing device that can perform highly accurate tampering detection of distinguishing between an alteration by an administrator and significant tampering. The information processing device acquires content from a web server in accordance with an acquisition request for the content by a browser terminal. The information processing device includes: a conversion unit ( | 2009-10-15 |
20090260080 | SYSTEM AND METHOD FOR VERIFICATION OF DOCUMENT PROCESSING DEVICE SECURITY BY MONITORING STATE TRANSISTIONS - The subject application is directed to a system and method for verification of document processing device security by monitoring of state transitions. State data is first acquired corresponding to a monitored sequence of states entered by a document processing device during operations and stored in an associated data storage. Authenticity data is thereafter generated representing the authenticity of the stored state data. State template data is then stored in the associated data storage corresponding to at least one acceptable sequence of states. Destination data is also stored in the associated data storage representing at least one preselected notification destination. A comparison is then performed of the acquired state data and the template state data. Notification data is then output based upon the result of the comparison of the state data and the state template data. | 2009-10-15 |
20090260081 | System and Method for Monitoring and Securing a Baseboard Management Controller - In certain embodiments, a method for monitoring and securing a baseboard management processor is provided. The method includes coupling to a baseboard management controller of a computer system via a console port, maintaining a persistent connection to the baseboard management controller, monitoring data from the console port, determining from the data whether an unauthorized access has occurred, and sending an alert if the unauthorized access has occurred. | 2009-10-15 |
20090260082 | Signature based authentication of the configuration of a configurable logic component - A configurable logic component is shown with a signature generator, responsive to a commanded configuration information signal from a processor, for providing a signed commanded configuration information signal, and with a memory device, responsive to the signed commanded configuration information signal from the signature generator, for storing the signed commanded configuration information signal in the configurable logic component for use by the processor in checking a current configuration of the configurable logic component against a trusted signed configuration file to ensure the current configuration matches the commanded configuration and allowing use of the configurable logic component in case of a match. | 2009-10-15 |
20090260083 | SYSTEM AND METHOD FOR SOURCE IP ANTI-SPOOFING SECURITY - A system and method that provides for using source IP addresses and MAC addresses in a network to provide security against attempts by users of the network to use false source IP addresses in data packets. The system and method provide for analyzing MAC addresses and source IP addresses at the datalink (layer 2) level, and to use the information derived from such analysis to block access through a port where a host device is using a false, or spoofed, source IP address in transmitted data packets. Further, the system and method provide for validating initially learned source IP addresses, and for determining whether the number of unsuccessful attempts to validate new source IP addresses exceeds a threshold level, and where the number does exceed the threshold number the system and method can provide for operation in a possible attack mode. | 2009-10-15 |
20090260084 | METHOD FOR VERIFYING CONFORMITY OF THE LOGICAL CONTENT OF A COMPUTER APPLIANCE WITH A REFERENCE CONTENT - A computer appliance and method are provided. The computer appliance includes a processor, a memory in which the processor can read and write, and an input/output device for interfacing the appliance processor with the outside world. In order to verify conformity of the logical content of the appliance with the reference content, the method includes sending to the appliance a request for loading into the memory and executing a verification program. The verification program is capable or writing data into the memory of the appliance and of reading data in the memory to send them to the input/output device. Then, the method includes sending to the appliance a request for executing the program to saturate the memory available not taken up by the program. Finally, it includes exchanging messages with the appliance by executing the program. Based on the exchanged messages, the conformity of the logical content of the appliance is verified. | 2009-10-15 |
20090260085 | APPARATUS, SYSTEM AND METHOD FOR BLOCKING MALICIOUS CODE - Provided are an apparatus, system and method for blocking malicious code. The apparatus includes a first malicious code detector for determining whether or not a received e-mail includes malicious code, on the basis of previously stored malicious code patterns, a second malicious code detector for performing second malicious code detection on a received e-mail determined by the first malicious code detector not to include malicious code, a pattern extractor for extracting a new malicious code pattern from malicious code detected by the second malicious code detector, and a transceiver for transferring the extracted new malicious code pattern to a pattern providing server. According to the apparatus, system and method, when one terminal detects a new malicious code pattern, a pattern providing server rapidly provides the new malicious code pattern to other terminals, and thus it is possible to rapidly and flexibly cope with the spread of malicious codes having new patterns | 2009-10-15 |
20090260086 | CONTROL FRAMEWORK GENERATION FOR IMPROVING A SECURITY RISK OF AN ENVIRONMENT - Apparatus and method for managing risk in an environment where information is received regarding a problem in an environment. A security risk is analyzed associated with the problem. Controls associated with the environment containing the problem are analyzed. A framework is generated defining one or more controls for mitigating the security risk responsive to the analyzed security risk and controls. | 2009-10-15 |
20090260087 | EXECUTABLE CONTENT FILTERING - Malicious executable content in network messages (e.g., request and response hypertext transfer protocol message) can circumvent some security measures. In addition, conventional security measures aimed at capturing malicious executable content noticeably impact system performance. Stream based filtering of network messages allows for efficient processing to remove malicious executable content. Furthermore, an extensible framework for executable content filtering streaming message elements allows for efficient adaptation of an executable content filter to new threats disguised as executable content. | 2009-10-15 |
20090260088 | System and Method for Data Destruction - A system and method for self-activated or remote-controlled data destruction for mobile devices. In an embodiment, when the user is unable to find their mobile device, they can log onto a web-base/software application through the computer or other communication device such as a telephone or mobile devices to request a data destruction command to be sent to the lost mobile device. If the lost mobile device, after a specified time duration, does not have any reception to receive any signals nor has any battery-power, the self-destruction application embedded in the mobile device will automatically activate itself during the next reset procedure or power up or shut down process. This application will perform a memory erase procedure for all selected data on the mobile device. To increase the area of service the embedded application can scan and connect to other available networks such as Wi-Fi to extend the coverage area. | 2009-10-15 |
20090260089 | BURGLARPROOF METHOD AND SYSTEM FOR PORTABLE COMPUTER DEVICES - A burglarproof method for portable computer devices is disclosed. When a portable computer device is activated, an IC thereof registers user data to a data server using an internal network device thereof and creates and uploads a hardware data table generated based on detection results by a BIOS to the data server. The hardware data table comprises an IP and a status field representing a use status of the portable computer device. When the status field represents “stolen”, the IC activates a stolen display function to lock a screen of the portable computer device to be incapable of performing any operations by users and performs a corresponding operation. | 2009-10-15 |
20090260090 | APOBEC3 MEDIATED DNA EDITING - The present invention relates to methods and compositions for preventing the occurance or progression of a cancer or pre-cancerous condition associated with expression, or over-expression of human cytidine deaminases of the APOBEC3 family. The invention also relates to drug screening assays designed to identify compounds that regulate the activity, or level of expression, of hA3A, hA3C and hA3H. The invention further relates to transgenic mice, as well as cells derived from said mice, that have been genetically engineered to express, or over-express hA3A, hA3C and/or hA3H. Such mice may be utilized to screen for, or identify, compounds that modulate the activity, or expression, of the human cytidine deaminases. The present invention also provides topical compositons such as cosmetic lotion, crème, or sunscreen for use on the skin, which comprise one or more inhibitors of human cytidine deaminase activity. The present invention relates to a double stranded DNA obtained following opening up of its duplex structure, said DNA being edited with cellular protein normally or abnormally expressed in the nucleus of an eukaryotic cell. The mono stranded DNA derived from the said double stranded DNA is a part of the present invention. | 2009-10-15 |
20090260091 | Methods and animal model for analyzing age-related macular degeneration - Methods for testing candidate drugs for treatment of age-related macular degeneration are provided. Ccl2-deficient, and Ccr2-deficient mice are used to determine the effect of candidate drugs and treatments on development of age-related macular degeneration. Also provided is a Ccl2-deficient, Ccr2-deficient dual knockout mouse, which is a useful animal model for age-related macular degeneration. | 2009-10-15 |
20090260092 | METHODS OF DIAGNOSING ALZHEIMER'S DISEASE AND MARKERS IDENTIFIED BY SET ASSOCIATION - The present disclosure relates to genetic markers and methods of diagnosing and screening for late-onset Alzheimer's disease (LOAD). As such, the disclosure encompasses a whole-genome association analysis of single nucleotide polymorphisms (SNPs) of which a number are located within the GRB2-associated binding protein 2 (GAB2) gene as well as other markers associated with other genes. The disclosure identifies two novel haplotypes within the GAB2 gene, i.e., a LOAD risk-enhancing and a LOAD risk-decreasing haplotype. These haplotypes modify LOAD risk differentially in combination with APOE alleles. Further encompassed are therapeutic methods and agents of decreasing the deterioration of cells associated with LOAD. | 2009-10-15 |
20090260093 | TRANSGENIC ANIMALS EXPRESSING CHIMERIC ANTIBODIES FOR USE IN PREPARING HUMAN ANTIBODIES - The invention provides transgene constructs for expressing chimeric antibodies, and transgenic non-human host animals carrying such constructs, wherein the chimeric antibodies comprise human variable regions and constant regions of the non-human transgenic host animal. The presence of immunoglobulin constant regions of the host animal allows for generation of improved antibodies in such transgenic host animals. Subsequently, the chimeric antibodies can be readily converted to fully human antibodies using recombinant DNA techniques. Thus, the invention provides compositions and methods for generating human antibodies in which chimeric antibodies raised in vivo in transgenic mice are used as intermediates and then converted to fully human antibodies in vitro. | 2009-10-15 |
20090260094 | Stearoyl-CoA Desaturase 4 Gene - The cloning of a fourth mouse SCD gene, mSCD4, as well as its corresponding cDNA and amino acid sequences are disclosed. Mouse SCD4 is expressed mainly in the heart tissue and synthesizes the bulk of monounsaturated fatty acids in the heart. The disclosure here enables new tools (e.g., nucleic acids, polypeptides, antibodies, vectors, recombinant cells, and transgenic and knock-out animals) for studying the function of various SCD isoforms and their connection to various disease conditions. New tools for converting saturated fatty acyl-CoA to monounsaturated acyl-CoA and for identifying SCD modulators including isoform-specific modulators are also enabled. In addition, given that accumulation of lipid in the heart (fatty heart) can have deleterious consequences, the present invention also provides a new prevention and treatment target for fatty heart as well as methods for screening candidate drugs. | 2009-10-15 |
20090260095 | Gene Marker for Evaluating Genetic Ability for Carcass Weight in Bovine and Method for Evaluating Genetic Ability for Carcass Weight Using the Same - The object of this invention is to provide a method for evaluating genetic ability for carcass weight in a bovine individual by using gene markers. According to the method, the nucleotide at the e9 site of the bovine NCAPG gene is determined. When it is G, genetic ability for increasing carcass weight is judged to be higher. Alternatively, the amino acid at the E9 site of the bovine NCAPG gene is determined. When it is methionine, genetic ability for increasing carcass weight is judged to be higher. | 2009-10-15 |
20090260096 | Celery Cultivar ADS-18 - A celery cultivar, designated ADS-18, is disclosed. The invention relates to the seeds of celery cultivar ADS-18, to the plants of celery cultivar ADS-18 and to methods for producing a celery plant by crossing the cultivar ADS-18 with itself or another celery cultivar. The invention further relates to methods for producing a celery plant containing in its genetic material one or more transgenes and to the transgenic celery plants and plant parts produced by those methods. This invention also relates to celery cultivars or breeding cultivars and plant parts derived from celery cultivar ADS-18, to methods for producing other celery cultivars, lines or plant parts derived from celery cultivar ADS-18 and to the celery plants, varieties, and their parts derived from the use of those methods. The invention further relates to hybrid celery seeds, plants, and plant parts produced by crossing cultivar ADS-18 with another celery cultivar. | 2009-10-15 |
20090260097 | Soybean Cultivar 05KL115639 - The present invention is in the field of soybean cultivar 05KL115639 breeding and development. The present invention particularly relates to the soybean cultivar 05KL115639 and its progeny, and methods of making 05KL115639. | 2009-10-15 |
20090260098 | DRY BEAN LINE 08560863 - The invention provides seed and plants of the bean line designated 08560863. The invention thus relates to the plants, seeds and tissue cultures of bean line 08560863, and to methods for producing a bean plant produced by crossing a plant of bean line 08560863 with itself or with another bean plant, such as a plant of another line. The invention further relates to seeds and plants produced by such crossing. The invention further relates to parts of a plant of bean line 08560863, including the pods and gametes of such plants. | 2009-10-15 |
20090260099 | DRY BEAN LINE 08550811 - The invention provides seed and plants of the bean line designated 08550811. The invention thus relates to the plants, seeds and tissue cultures of bean line 08550811, and to methods for producing a bean plant produced by crossing a plant of bean line 08550811 with itself or with another bean plant, such as a plant of another line. The invention further relates to seeds and plants produced by such crossing. The invention further relates to parts of a plant of bean line 08550811, including the pods and gametes of such plants. | 2009-10-15 |
20090260100 | PEA LINE 08540794 - The invention provides seed and plants of the pea line designated 08540794. The invention thus relates to the plants, seeds and tissue cultures of pea line 08540794, and to methods for producing a pea plant produced by crossing a plant of pea line 08540794 with itself or with another pea plant, such as a plant of another line. The invention further relates to seeds and plants produced by such crossing. The invention further relates to parts of a plant of pea line 08540794, including the seed, pod, and gametes of such plants. | 2009-10-15 |
20090260101 | Heat resistant plants and plant tissues and methods and materials for making and using same - The subject invention concerns materials and methods for providing plants or plant tissue with increased resistance to heat conditions. Increased resistance of a plant or plant tissue to heat conditions provides for decreased yield losses generally observed at elevated temperatures. One aspect of the invention concerns polynucleotides that encode a mutant plant small subunit of AGPase. The subject invention also comprises a mutant plant small subunit of AGPase encoded by a polynucleotide of the invention. The subject invention also concerns plants comprising a polynucleotide of the invention and method for making the plants. | 2009-10-15 |
20090260102 | METHOD FOR THE INTRODUCTION OF A HETEROLOGOUS POLYNUCLEOTIDE INTO A MUSHROOM - The invention develops a simple and reliable mushroom transformation procedure on the basis of electroporation of spores or mycelial fragments of mushroom. | 2009-10-15 |
20090260103 | TERMINATION OF TRANSGENE EXPRESSION VIA TRANSPOSON-MEDIATED BREAK - This invention provides a genetic construct comprising: (a) a DNA cut-and-paste transposon genetic unit which comprises a transposase gene flanked on either side by inverted repeat sequences and operably under the control of a first promoter; and (b) a transgene unit which comprises an expressable transgene, placed operably under the control of a second promoter; wherein the transposon genetic unit and the transgene unit are linked with one of the inverted repeat sequence located in an intron of the transgene. | 2009-10-15 |
20090260104 | NOVEL GLYPHOSATE-N-ACETYLTRANSFERASE (GAT) GENES - Novel proteins are provided herein, including proteins capable of catalyzing the acetylation of glyphosate and other structurally related proteins. Also provided are novel polynucleotides capable of encoding these proteins, compositions that include one or more of these novel proteins and/or polynucleotides, recombinant cells and transgenic plants comprising these novel compounds, diversification methods involving the novel compounds, and methods of using the compounds. Some of the novel methods and compounds provided herein can be used to render an organism, such as a plant, resistant to glyphosate. | 2009-10-15 |
20090260105 | UDP-Xylose Synthases (UXS) Polynucleotides, Polypeptides, and Uses Thereof - The present disclosure concerns methods and compositions relating to UXS polypeptides and/or nucleic acids encoding UXS polypeptides. In certain claims, the methods and compositions are of use to improve digestibility and/or ease of grain processing. Such improvements relate to a modulation in arabinoxylan and/or hemicellulose content in transgenic plants. Such plants can, for example, comprise one or more nucleic acid sequences that inhibit expression of one or more UDP-Xylose Synthase (UXS) genes. | 2009-10-15 |
20090260106 | ANTIFUNGAL POLYPEPTIDES - Compositions and methods for protecting a plant from a pathogen, particularly a fungal pathogen, are provided. Compositions include novel amino acid sequences, and variants and fragments thereof, for antipathogenic polypeptides that were isolated from microbial fermentation broths. Nucleic acid molecules comprising nucleotide sequences that encode the antipathogenic polypeptides of the invention are also provided. A method for inducing pathogen resistance in a plant using the nucleotide sequences disclosed herein is further provided. The method comprises introducing into a plant an expression cassette comprising a promoter operably linked to a nucleotide sequence that encodes an antipathogenic polypeptide of the invention. Compositions comprising an antipathogenic polypeptide or a transformed microorganism comprising a nucleic acid of the invention in combination with a carrier and methods of using these compositions to protect a plant from a pathogen are further provided. Transformed plants, plant cells, seeds, and microorganisms comprising a nucleotide sequence that encodes an antipathogenic polypeptide of the invention, or variant or fragment thereof, are also disclosed. | 2009-10-15 |
20090260107 | Coleopteran-Resistant Transgenic Plants and Methods of Their Production - Disclosed are nucleic acid segments comprising synthetically-modified genes encoding Coleopteran-toxic | 2009-10-15 |
20090260108 | PLANT PRODUCING HYALURONIC ACID - It is intended to provide by improving a known method of producing hyaluronic acid in a plant, a plant or a cultured plant cells which can produce hyaluronic acid at a lower cost and a further higher yield than before, a method of preparing the same, an expression vector for transformation, a method of producing hyaluronic acid using the plant or the cultured plant cells and the like. The method of producing hyaluronic acid comprising obtaining hyaluronic acid by co-expressing a protein with hyaluronic acid synthase activity and an exogenous protein with sugar-nucleotide synthase activity in a plant cell or a plant is provided. | 2009-10-15 |
20090260109 | Methods of increasing abiotic stress tolerance and/or biomass in plants genterated thereby - Provided are methods of increasing the tolerance of a plant to abiotic stresses and/or increasing the biomass and/or increasing the yield of a plant by expressing within the plant an exogenous polynucleotide homologous to SEQ ID NO:13. | 2009-10-15 |
20090260110 | METHOD OF BREEDING GERMINABLE TRANSGENIC BROADLEAVED TREE SPECIES - Methods of breeding germinable transgenic broadleaved tree species are disclosed which include the following steps: (1) the main stem of a tree is cutoff at the height of 50-160 cm above the ground; (2) the transection is dipped with 0.3-0.5 OD | 2009-10-15 |
20090260111 | Maize Stress-Responsive Promoter - Methods and compositions for modulating plant development are provided. Polynucleotide sequences encoding ZmSNAC polypeptides are provided, as are the amino acid sequences of the encoded polypeptides. The sequences can be used in a variety of methods including modulating root development, modulating floral development, modulating leaf and/or shoot development, modulating senescence, modulating seed size and/or weight, and modulating tolerance of plants to abiotic stress. Transformed plants, plant cells, tissues, and seed are also provided. A stress-inducible ZmSNAC1 promoter is also provided. | 2009-10-15 |
20090260112 | Stable Emission Gas Ion Source and Method for Operation Thereof - A method of operating a focused ion beam device for emitting during operation a focused ion beam including ions of a gas generated at a first partial pressure, comprising cleaning an emitter tip positioned in an emitter tip region of the focused ion beam device, the cleaning comprises introducing the gas into the emitter tip region such that the gas has a second partial pressure of at least two times the first pressure. Further, a focused ion beam device is provided, comprising a gas field emitter tip ( | 2009-10-15 |
20090260113 | Probe Microscope Setup Method - A scanning probe microscope and method of operation for monitoring and assessing proper tracking between the tip and sample, as well as automating at least some aspects of AFM setup previously done manually. Preferably, local slopes corresponding to the acquired data are compared to determine a tracking metric that is self-normalizing. | 2009-10-15 |
20090260114 | SCANNING ION CONDUCTANCE MICROSCOPY FOR THE INVESTIGATION OF LIVING CELLS - A method for interrogating a surface using scanning probe microscopy comprises bringing a scanning probe into proximity with the surface and controlling the position of the probe relative to the surface to maintain a constant distance, characterized in that pressure is applied to the surface by a regulated flow of liquid through the probe, with subsequent monitoring of the position of the probe, wherein movement of the probe indicates a consequent movement of the surface. | 2009-10-15 |
20090260115 | BLUEBERRY PLANT NAMED 'DRISBLUETHREE' - This invention relates to a new and distinct cultivar of blueberry plant primarily characterized by medium-large berries with strong sweetness, weak acidity, and a nearly spherical berry shape and berries that have green flesh, is disclosed. | 2009-10-15 |
20090260116 | BLUEBERRY PLANT NAMED 'DRISBLUEONE' - This invention relates to a new and distinct cultivar of blueberry plant named ‘DrisBlueOne’ primarily characterized by large berries with medium sweetness, medium acidity, and slightly oblate spherical berry shape and berries that have green flesh, is disclosed. | 2009-10-15 |
20090260117 | APPLE TREE NAMED 'CO-OP 31' - A new apple variety distinguished by the following unique combination of characteristics: It is field-immune to apple scab disease, has good resistance to the bacterial disease fire blight, and moderate resistance to the fungal disease powdery mildew. This new apple is relatively late ripening. It has medium-large fruit size, red colored fruit, with excellent flavor (full favored, fruity, sweet, mild-subacid). The fruit hangs well on the tree, even after ripening. The tree is highly productive on an annual basis. | 2009-10-15 |
20090260118 | Redbud tree (Cercis canadensis) variety named 'Gold Crown' - A novel variety of the redbud tree | 2009-10-15 |
20090260119 | MINT PLANT NAMED "METOLIUS" - A new and distinct variety of | 2009-10-15 |
20090260120 | EPIMEDIUM PLANT NAMED 'CONALBA' | 2009-10-15 |
20090260121 | LOBELIA PLANT NAMED 'KLELE07246' - A new cultivar of | 2009-10-15 |