49th week of 2010 patent applcation highlights part 55 |
Patent application number | Title | Published |
20100313174 | Systems and Methods for Improving the PN Ratio of a Logic Gate by Adding a Non-Switching Transistor - Systems and methods for improving a PN ratio of a logic gate by adding a non-switching transistor. In one embodiment, the logic gate includes a plurality of PMOS switching transistors and a plurality of NMOS switching transistors that are switched on and off by received input signals. The PMOS and NMOS switching transistors are interconnected to perform a logic operation on the input signals and produce a corresponding output signal. The non-switching transistor is inserted in the circuit to improve the ratio of PMOS and NMOS transistors between the power nodes of the logic gate. The non-switching transistor is either a PMOS transistor or an NMOS transistor as needed to make the PN ratio closer to 1. The non-switching transistor is biased to keep it switched on and does not affect the logic functions of the gate. | 2010-12-09 |
20100313175 | VERIFICATION SYSTEMS AND METHODS - Described are verification devices and methods for controlling X propagation in a circuit design which identify a first location in a circuit at which an X value is generated, specify a second location in the circuit at which the X value is unwanted, and prove that the X value is unable to propagate from the first location to the second location over any path through the circuit between the first and second locations. | 2010-12-09 |
20100313176 | DELAY LIBRARY, DELAY LIBRARY CREATION METHOD, AND DELAY CALCULATION METHOD - A timing window (TW) representing a time zone where a signal transition possibly occurs in a time axis is generated for each of input signals in input terminals in a multi-input logic cell based on a signal transition timing in each of the input terminals. An overlap between the timing windows (TW) of input signals is detected, and a circuit delay time is calculated by selectively using one of a synchronous transition time and an asynchronous transition time in accordance with the overlap between the timing windows (TW). These processing steps are sequentially repeated to eliminate an optimistic or pessimistic analysis in the calculation of delay times in the multi-input logic cell. | 2010-12-09 |
20100313179 | INTEGRATED WORK LISTS FOR ENGINEERING PROJECT CHANGE MANAGEMENT - A tool supports management of engineering project changes using a current design diagram with links to implementation components, a proposed design diagram, and a work list of tasks for transforming the current design into the proposed design. Tasks recite intended changes such as add, remove, or refactor, with reference to implementation components to be changed, and tracking information. Work list tasks may be automatically generated based on design model differences correlated with project code, automatically generated based on tracked user design actions correlated with project code, and/or manually generated by users. Work lists may be exported. Users can mark a relationship for removal and view a corresponding updated work list. Users can trace impact of a work list on project context such as testing coverage, database structures, and user scenarios. | 2010-12-09 |
20100313180 | SYSTEMS AND METHODS FOR VARYING SOFTWARE BUILD PROPERTIES USING PRIMARY AND SUPPLEMENTAL BUILD FILES - A primary file can be used to specify default build properties for software under development. A set of modified build properties may be stored in a supplemental file. The default build properties can be temporarily overridden with modified build properties for a given build, allowing freedom in the choice of build properties without proliferation of files used for the same purpose, which can be confusing. In addition, users can create new build commands for software under development, and associate the new commands with supplemental files. When the user invokes a new build command, the build process can override the default properties with the modified properties in the supplemental file, and then restore the defaults. Other advantages and features of the invention are described below. | 2010-12-09 |
20100313185 | ACCESS TO TEST-READY VIRTUAL ENVIRONMENTS - Aspects of the subject matter described herein relate to test-ready virtual environments. In aspects, a lab environment may be configured that includes multiple virtual machines. The virtual machines may be configured with deployment agents that can be used to install and configure programs on the virtual machines. The virtual machines may also be configured with test agents that can engage in testing activities with respect to the virtual machines. Lab agents may be installed in the virtual machines that manage and monitor the health of the deployment and test agents. Components are described that control configuring the virtual machines of the lab environment into a known state that is ready for development or testing. Various applications of the above are also described. | 2010-12-09 |
20100313186 | DEVELOPER-MANAGED DEBUGGER DATA RECORDS - A developer analysis record supports debugging. One developer analysis record contains a copy of a debuggee source code expression including one or more variables. An expression location in the record specifies the location of the expression within debuggee source code, and an expression scope specifies the scope of the expression within the source code. Developer comments about the expression may be stored in the record, distinct from source code and free from programming language syntax restrictions. The developer analysis record can be stored by a developer during one debugger session and then retrieved by the same or another developer during a later debugger session. The developer analysis record can be displayed and updated in a floating window, such as a tear-off floating datatip window. | 2010-12-09 |
20100313187 | METHOD AND SYSTEM FOR DETECTING INFEASIBLE PATHS - A method of testing a software program comprises obtaining path properties of an infeasible path, selecting a path from the software program and obtaining path properties of the selected path, wherein the method further comprises comparing path properties of the selected path to the path properties of the infeasible path to identify a target path and determine infeasibility of the target path. | 2010-12-09 |
20100313188 | Method for Preventing Software Reverse Engineering, Unauthorized Modification, and Runtime Data Interception - A method for preventing the unauthorized modification of a software or unauthorized modification of runtime data. According to this method, a converter, which is capable of converting the software into a generalized machine code is provided. The converter is designed such that it cannot be reverse engineered, by using a conversion process that causes data loss. An interpreter, which the knowledge of its process method is kept restricted, is also provided. The interpreter interprets the general machine code into a specific machine code, while reconstructing the lost data during the interpretation process. | 2010-12-09 |
20100313195 | Determining required software components for SCSI system initialization - A first managing software component for a first data transmission protocol and a first portion of a first utilization software component for the first data transmission protocol are loaded on a computer system. The inclusion of the first managing software component for the first data transmission protocol is verified. A second managing software component for a second data transmission protocol and a first portion of a second utilization software component for the second data transmission protocol is loaded. The inclusion of the second managing software component for the second data transmission protocol is verified. A usable protocol combination is identified including at least the first data transmission protocol and the second data transmission protocol. A second portion of the first utilization software component and a second portion of the second utilization software component are loaded upon identifying the usable protocol combination including at least the first data transmission protocol and the second data transmission protocol. | 2010-12-09 |
20100313196 | MANAGING SECURELY INSTALLED APPLICATIONS - Embodiments of the present disclosure provide methods and systems for managing securely installed applications. After installation, an installation framework performs a bind process to correlate the randomly assigned identifier with the unique identifier of the application. The installation framework also manages the execution of the application. When an application is launched, the application framework performs a search for that application's randomly assigned identifier and locates the application's container. The application is then allowed to execute within its container. During execution, the software application may also be restricted in various ways by the installation framework to its dynamic containers. The installer may also work with a trusted operating system component, such as the kernel, to help enforce the container restrictions. In addition, if desired, the use of random identifiers for containers may be used in conjunction with other security mechanisms, such as the use of code signing. | 2010-12-09 |
20100313201 | METHODS AND APPARATUS FOR FAST CONTEXT SWITCHING IN A VIRTUALIZED SYSTEM - The present disclosure provides methods and apparatus for fast context switching in a virtualized system. In the disclosed system, a globally unique application-space identifier is associated with each guest application. No two applications share the same application-space identifier, even if the two applications reside in different virtual machines. Domain identifiers are used to ensure that a guest's mappings are only active when that guest is executing. A unique domain identifier is associated with each virtual machine, and all translation lookaside buffer entries thereby mapping the guest's kernel pages with that domain value. All other mappings are tagged with a predefined domain such as zero. In addition, a virtual memory management unit may be configured to support two virtual page table pointers and a configurable boundary between a virtual user page table and a virtual kernel page table. In such an instance, the two virtual page table pointers are presented to a guest operating system, and two physical page table pointers are associated with the two virtual page table pointers. | 2010-12-09 |
20100313202 | AUTOMATICALLY CORRELATING TRANSACTION EVENTS - An API can be extended to automatically correlate events based on context. Started events for each context (e.g. threads of execution) are maintained on independent stacks. When an instrumented application starts a new transaction, the API generates a started event. A transaction correlation unit within the API can determine if the new transaction started during a previous transaction. If there is a previous started event on the stack, the new transaction started during the previous transaction. The transaction correlation unit can insert an outbound indicator into the new started event to associate the new transaction and the previous transaction. Then, the new started event can be pushed on the stack. | 2010-12-09 |
20100313207 | SERVICE PROVIDER MANAGEMENT DEVICE, SERVICE PROVIDER MANAGEMENT PROGRAM, AND SERVICE PROVIDER MANAGEMENT METHOD - For a distributed application execution environment where the execution of a business process is accomplished by combining services in a manner that suits the business process to be executed, technologies have been developed to allocate hardware resources necessary to execute services that constitute a business process. With the conventional technologies, however, when using existing hardware resources is not enough to satisfy a requested execution quality of a service, the service is executed with a quality lower than the requested level. The present invention makes it possible to purvey IT resources flexibly in a distributed processing environment such that the requested level of business process execution quality is met. The present invention flexibly changes the configuration of IT resources that execute services constituting a business process, so that a requested quality of the business process is met. | 2010-12-09 |
20100313208 | METHOD AND APPARATUS FOR IMPLEMENTING ATOMIC FIFO - Techniques for implementing an atomic FIFO queue and system for processing queue elements are described herein. According to one embodiment, in a first thread of execution, new data is atomically merged with existing data of an object via an atomic instruction associated with hardware that executes the first thread. An attempt is made to acquire ownership of the object (exclusive access). If successful, the object is enqueued on an atomic FIFO queue as a continuation element for further processing. Otherwise, another thread of execution is safely assumed to have acquired ownership and taken responsibility to enqueue the object. A second thread of execution processes the atomic FIFO queue and assumes ownership of the continuation elements. The second thread invokes a function member of the continuation element with a data member of the continuation element, the data member including the newly merged data. Other methods and apparatuses are also described. | 2010-12-09 |
20100313211 | DISC DRIVE DEVICE - To provide a disc drive device which does not spend a lot of money on components and requires the less number of components than the conventional technology and has a function to correctly dispose an inserted disc by a slot-in method at a place where the disc can be driven according to the size of the disc. The disc drive device comprises an abutment pad which receives the inserted disc in a different posture depending on the size of the disc, a coupling member which rotationally transfers by a different distance at a different position according to the posture of the abutment pad when it rotationally transfers along with the bring-in operation of the disc, and a spring which applies a predetermined energizing force to the coupling member. Due to the coupled operation of these components, etc., the inserted disc can be correctly disposed at a predetermined place where the disc can be driven according to the size of the disc. | 2010-12-09 |
20100313212 | TURNTABLE AND METHOD FOR MANUFACTURING THE SAME - A turntable for a storage disk drive apparatus includes a plate member made of a ferromagnetic material and a central resin member arranged at the center of the plate member and formed into a single member by injection-molding a resin. The plate member includes a peripheral plate portion and a central plate portion positioned higher than the peripheral plate portion. The central plate portion includes a plate center hole defined at the center of the plate member. The central resin member includes a resinous cylinder portion extending through the plate center hole and defining a resin central through-hole, a disk guide portion arranged to guide a disk center hole, and a resinous connector portion arranged above the central plate portion to interconnect the resinous cylinder portion and the disk guide portion. | 2010-12-09 |
20100313215 | VIDEO AND DIGITAL MULTIMEDIA AGGREGATOR - The present invention utilizes an aggregator for searching, packaging and delivering content. The aggregator processes requests, searches, provides search results and acquires content. The aggregator, operating in a communications network, includes a request and results processing server, a search engine server coupled to the request and results processing server and a content acquisition server coupled to the request and results processing server. A request and results processing server receives a request for content, the search engine server searches for the content and the content acquisition program acquires content for delivery to the user. The request and results processing server includes a search request processor that receives information related to a user's search request and provides the information to a search results form builder that creates an electronic search request. | 2010-12-09 |
20100313216 | Integration of television advertising with internet shopping - For integration of televising advertising with Internet shopping, a link to a web page intended for ordering of advertised product is multiplexed with a stream of video data. At the receiving side, a processor embedded in a set-top box with a USB port detects the link and when the commercial is in progress displays a message prompting a user to save the link. If the user responds, the processor saves the link in a flash drive plugged into the USB port. As a result, the user can watch TV without interruption and shop online at a time of his or her choice by simply pulling the flash drive from the set-top, plugging it into a USB port of a computer with Internet connection and using the link to access the web page for additional information and ordering the product. Optionally, the commercial itself could be recorded on the flash drive and replayed in the computer at the time of online shopping. | 2010-12-09 |
20100313217 | METHODS AND SYSTEMS FOR RECOVERING FROM ERRORS ASSOCIATED WITH ADVERTISEMENT STREAMS - An exemplary method includes switching, by a media content access subsystem, from a program stream to an advertisement stream in response to a switching instruction received by the media content access subsystem, detecting, by the media content access subsystem, a predetermined number of markers included within the advertisement stream, the predetermined number of markers indicative of an error associated with the advertisement stream, and switching, by the media content access subsystem, from the advertisement stream to another media content stream in response to the detecting of the predetermined number of markers. Corresponding methods and systems are also disclosed. | 2010-12-09 |
20100313218 | Targeting Television Advertisements Based on Automatic Optimization of Demographic Information - Systems and procedures which allow for the placement of advertisements in an optimized manner are presented. Systems may be provided which may be configured to optimize a media plan (either automatically or manually, or a combinations of both) using demographic vectors, and may display the optimization results in a quantifiable manner using terms and numbers. | 2010-12-09 |
20100313221 | CLIENT-SERVER BASED INTERACTIVE TELEVISION PROGRAM GUIDE SYSTEM WITH REMOTE SERVER RECORDING - An interactive television program guide system is provided. An interactive television program guide provides users with an opportunity to select programs for recording on a remote media server. Programs may also be recorded on a local media server. The program guide provides users with VCR-like control over programs that are played back from the media servers and over real-time cached copies of the programs. The program guide also provides users with an opportunity to designate gift recipients for whom programs may be recorded. | 2010-12-09 |
20100313222 | METHOD FOR UPDATING BROADCASTING PROGRAM INFORMATION IN TERMINAL AND MOBILE TERMINAL USING THE SAME - A method for updating broadcasting program information in a mobile terminal, the terminal capable of receiving the broadcasting program from a plurality of frequency bands is disclosed, the method includes selecting at least one frequency band including the plurality of broadcasting channels or a broadcasting channel in the plurality of frequency bands; and attempting an update on the broadcasting program information of the entire broadcasting channel within the selected frequency band or the selected broadcasting channel. | 2010-12-09 |
20100313223 | User Selection of Software Components in a Television Set-Top Box - A method for allowing user selection of interactive video software components in a television STB operatively coupled to a video content network includes the steps of: affording the user a selection of interactive video software components to run on the set-top box; and loading selected interactive video software components onto the set-top box. The selected interactive video software components are delivered from a remote node over the video content network to which the STB is coupled. | 2010-12-09 |
20100313224 | CLIENT-SERVER BASED INTERACTIVE TELEVISION PROGRAM GUIDE SYSTEM WITH REMOTE SERVER RECORDING - An interactive television program guide system is provided. An interactive television program guide provides users with an opportunity to select programs for recording on a remote media server. Programs may also be recorded on a local media server. The program guide provides users with VCR-like control over programs that are played back from the media servers and over real-time cached copies of the programs. The program guide also provides users with an opportunity to designate gift recipients for whom programs may be recorded. | 2010-12-09 |
20100313225 | MEDIA BRIDGE APPARATUS AND METHODS - Methods and apparatus for content, media and data delivery and access between devices of a premises and one or more portable media devices. In one embodiment, the apparatus comprises a media bridge between a portable media device (PMD) and a user's home network and/or home devices (e.g., set-top boxes, DVRs, etc.)). The apparatus is adapted to convert content stored on a PMD to a format capable of being rendered on a home device which may then store or playback the content. Control of the presentation is also provided by the bridging apparatus. The apparatus may also be adapted to transfer content from the home device to the PMD for storage or playback. In another embodiment, the apparatus may function within a home network having a trusted domain to provide content between a plurality devices on the network (and in the domain) and the PMD. | 2010-12-09 |
20100313226 | MEDIA BRIDGE APPARATUS AND METHODS - Methods and apparatus for content, media and data delivery and access between devices of a premises and one or more portable media devices. In one embodiment, the apparatus comprises a media bridge between a portable media device (PMD) and a user's home network and/or home devices (e.g., set-top boxes, DVRs, etc.)). The apparatus is adapted to convert content stored on a PMD to a format capable of being rendered on a home device which may then store or playback the content. Control of the presentation is also provided by the bridging apparatus. The apparatus may also be adapted to transfer content from the home device to the PMD for storage or playback. In another embodiment, the apparatus may function within a home network having a trusted domain to provide content between a plurality devices on the network (and in the domain) and the PMD. | 2010-12-09 |
20100313229 | Threshold Based Computer Video Output Recording Application - An application that is capable of monitoring Internet or network traffic and performing recordings of computer video output based on network activity thresholds. The recording application is typically not installed on the computer to be recorded but can reside on the computer to be recorded. The application contains a configuration interface that allows a user to set thresholds for certain types of network activity usage. When a threshold is reached, the application will begin a video recording of the computer's video activity which will be stored for later use. The application can be configured to include settings such as the length of the recording. In a typical environment, the application is a hardware appliance that is capable of monitoring web activity and network traffic and can connect to the computer over the network in order to perform the recording. The computer to be recorded can have specific software that is capable of capturing the video or can use industry standard video capturing software such as VNC. VNC is typically used to view and control computers as well as send video images of the computer and the application can utilize an existing application such as this to perform the recording over the network. The recording application can integrate with software tools such as VNC and does not require specifically developed proprietary software to be installed on the monitored computer in order to perform a recording of the computers video output. | 2010-12-09 |
20100313230 | Testing a Content-Delivery System - A content delivery networked is monitored to verify operation of control channels for the delivery of content to a customer. Monitoring includes joining a connection with at least one control channel in the network, decoding content of a signal in the control channel, determining whether the decoded content complies with a pre-determined rule corresponding to content transmitted in the control channel, and producing a report indicating whether the decoded content is compliant with the rule. In addition, a graphical user interface (GUI) displays the status and results of testing the control channel. The GUI is configured to perform generating a display representing testing status of a plurality of DSG tunnels in a first frame and test results of the DSG tunnels in a second frame and providing details of a DSG tunnel test when selected by a user. | 2010-12-09 |
20100313231 | INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND PROGRAM - The present invention relates to an information processing apparatus, an information processing method, and a program that enable easy information acquisition. | 2010-12-09 |
20100313232 | INTEGRATED SATELLITE-TV BROADBAND WIRELESS SYSTEM - Systems and methods for combining a satellite broadcast system with a wireless system are described. The system comprises a satellite receive antenna and a wireless system device coupled thereto, the wireless system device comprising a wireless network antenna, a wireless radio system coupled to the antenna, a networking bridge coupled to the radio system, and a coaxial networking bridge for coupling a satellite signal on the satellite broadcast system with a wireless signal on the wireless network, wherein the coaxial network bridge enables a device to receive the satellite signal and the wireless signal. | 2010-12-09 |
20100313235 | PROVIDING SYNDICATION FEED CONTENT ON A TELEVISION SET-TOP BOX WITH LIMITED DECODER CAPABILITY - Techniques are afforded for providing syndication feed content on a television STB with limited decoder capability. A request is initiated for syndication feed content from a networked content source through the STB. The syndication feed content is obtained through a proxy device in communication with the networked content source. When the syndication feed content is in a first format usable by the STB, the proxy device passes the syndication feed content in the first format to the STB. When the syndication feed content is in a second format unusable by the STB, the syndication feed content is first converted from the second format to the first format usable by the STB and then the syndication feed content is passed, in the first format, to the STB. | 2010-12-09 |
20100313236 | TECHNIQUES FOR UNGRADING SOFTWARE IN A VIDEO CONTENT NETWORK - It is determined that a substantial portion of set-top terminals connected to a video content network require a software upgrade. In-band video bandwidth (e.g., video-on-demand or switched digital video) is allocated for the software upgrade. The software upgrade is broadcast to the set-top terminals from a carousel in a first remote node of the video content network, via the allocated in-band video bandwidth, until a predetermined number of the set-top terminals have received the software upgrade. Subsequent to the predetermined number of set-top terminals receiving the software upgrade, the in-band video bandwidth is de-allocated and the software upgrade is made available out-of-band to the remaining portion of the set-top terminals, via individual sessions with an application server in a second remote node of the video content network. An exemplary system, which can implement the method, includes a controller, a dynamic bandwidth allocation device, the carousel, and the application server. | 2010-12-09 |
20100313243 | DIGITAL SOCIAL NETWORK TRUST PROPAGATION - A trust propagation system is disclosed that propagates trust data based on established trust relationships. The trust system may automatically propagate trust data between parties A and C based on trust relationships with a common party B. Trust data may include authentication data such as biometric data, encryption data, passwords, etc. that may be used to conduct exclusive communications. | 2010-12-09 |
20100313244 | METHODS AND APPARATUS FOR DISTRIBUTING, STORING, AND REPLAYING DIRECTIVES WITHIN A NETWORK - In one embodiment, a processor-readable medium stored code representing instructions that when executed by a processor cause the processor to receive a directive from a first client device, store the directive at a memory location, and send the directive to a second client device. The directive includes a directive description portion and a directive content portion. The memory location is associated with the first client device. The directive is configured to cause the second client device to update a context of a display operatively coupled to the second client device in response to the directive. The context being of a directive class associated with the directive description portion, and having a value associated with the directive content portion. | 2010-12-09 |
20100313245 | AUTHENTICATION ENGINE FOR ENROLLMENT INTO A COMPUTER ENVIRONMENT - Embodiments of the invention are generally directed to a system and method for enrolling a user into an authentication system. In some embodiments of the invention, a user completes a first portion of the enrollment or setup process using a first computer environment, but is not permitted to complete the enrollment or setup process from the first computer environment. The system permits the user to complete the enrollment or setup process only from a second computer environment different from the first computer environment. In one embodiment, the second computer environment is any computer environment outside of the first computer environment. | 2010-12-09 |
20100313246 | DISTRIBUTED PROTOCOL FOR AUTHORISATION - A decentralised, distributed approach to performing authorisation involves receiving an authorisation request at a service providing device, for example “Carol”, and then retrieving trust information from other peer devices in the network. The gathered information is used by the device “Carol” to make a well-informed authorisation decision. | 2010-12-09 |
20100313251 | Method and Apparatus for Coordinating a Change in Service Provider Between a Client and a Server with Identity Based Service Access Management - A method of configuring a network access device connected to an access network connected to a plurality of service networks, the network device having a first network address allocated to a subscriber of services of a first service provider provided by a first service network, with a new network address allocated to a second subscriber of services of either the first service provider, or a second service provider provided by a second service network. The method comprises the steps of: sending a request from the network access device to the access network with user credentials for the second subscriber requesting access to the first service provider or a change to the second service provider; receiving a response from the access network; and initiating a network address change request using a configuration protocol. In this manner, a second network address allocated to the second subscriber of services of either the first or second service providers is assigned to the network access device to enable the network access device to communicate data packets to the service network providing the selected service. | 2010-12-09 |
20100313252 | System, method and apparatus for creating and using a virtual layer within a web browsing environment - A system and a method for configuring a user-editable layer within a network are disclosed. The system includes a client computing system including a web browser. The web browser further includes a loaded webpage configured to obtain web content from a universal network server through a web address. The system further includes an application object model to collect objects from the client computing system and the universal network server. The system for configuring the user-editable layer within the network further includes a plug-in unit coupled to a layer definition server and an authenticating server for authenticating user credential information. The user-editable layer may include at least one of a virtual layer, an emulating layer, an upgradable layer and the like. | 2010-12-09 |
20100313257 | Enforcing single stream per sign-on from a content delivery network (CDN) media server - A method for enforcing a media stream delivery restriction uses a stream control service (SCS). The SCS is implemented in a distributed network, such as a CDN, in which a given media stream is delivered to authorized end users from multiple delivery servers, but where an authorized end user is associated with a single log-in identifier that is not intended to be shared with other end users. According to the method, an enforcement server of the SCS identifies first and second copies of the given media stream associated with the single log-in identifier being delivered from multiple delivery servers. It then issues message to terminate delivery of the given media stream from at least one of the multiple delivery servers. | 2010-12-09 |
20100313258 | IDENTIFYING SYNONYMS OF ENTITIES USING A DOCUMENT COLLECTION - Identifying synonyms of entities using a collection of documents is disclosed herein. In some aspects, a document from a collection of documents may be analyzed to identify hit sequences that include one or more tokens (e.g., words, number, etc.). The hit sequences may then be used to generate discriminating token sets (DTS's) that are subsets of both the hit sequences and the entity names. The DTS's are matched with corresponding entity names, and then used to create DTS phrases by selecting adjacent text in the document that is proximate to the DTS. The DTS phrases may be analyzed to determine whether the corresponding DTS is synonyms of the entity name. In various aspects, the tokens of an associated entity name that are present in the DTS phrases are used to generate a score for the DTS. When the score at least reaches a threshold, the DTS may be designated as a synonym. A list of synonyms may be generated for each entity name. | 2010-12-09 |
20100313259 | Method for Establishing a Secure Connection from a Service Technician to a Component of an Automation Environment that can be Remotely Diagnosed and/or Maintained and is Experiencing Failure - A method for establishing a secure connection from a service technician to a component of an automation environment that can be remotely diagnosed and/or maintained and is experiencing failure. A service certificate is required for establishing the secure connection, wherein a secure initial connection is first established to the automation environment by the service technician using a one-time password. With the initial connection, a service certificate required for establishing the secure connection to the component of the automation environment experiencing the failure is subsequently transmitted from the automation environment to the service technician. The secure connection from the service technician to the component experiencing the failure is then established by means of the service certificate. The invention further relates to an automation environment that is suitable for carrying out a method of said kind. | 2010-12-09 |
20100313260 | METHOD AND SYSTEM OF PROVIDING FIREWALL IN HANDSET - A method of providing firewall in handset is disclosed. The method includes receiving a request with a telephone number by a handset. The handset determines if the telephone number meets a refusing condition. The refusing condition includes a telephone number interval with at least one number and a symbolic variable. The handset refuses the request of the telephone number if the telephone number meets the refusing condition. | 2010-12-09 |
20100313261 | Communication method for device in network system and system for managing network devices - A communication method for a device in a network system and a system for managing network devices are disclosed. The communication method for a device in a network system includes connecting a management server that manages at least one device in an internal network, the at least one device, and a designated device with one another through a firewall, the internal network, and an external network; the designated device maintaining a connection with the management server; and if a message for requesting a connection with a target device among the at least one device is received by the designated device from the management server, the designated device forwarding the received message to the target device. According to this method, the management server can connect and communicate with managed devices, whenever necessary, by making the designated device connected to the network continuously maintain the connection with the management server. | 2010-12-09 |
20100313262 | PROVISIONING REMOTE ACCESS POINTS - Provisioning remote access points for use in a telecommunication network. A remote access point contains identity information established during manufacturing; this identity information may be in the nature of a digital certificate. The identity information is stored in the remote access point, and may be stored in a Trusted Platform Module if present. When the remote access node is powered up in unprovisioned state, outside the manufacturing environment, it attempts to establish an internet connection via a first wired interface, and queries a user for information representing the TCP/IP address of its controller via a second wired interface. Once an internet connection is present, and a TCP/IP address has been provided, the remote access point attempts to connect to the controller at that address. The controller may filter connection requests through a whitelist of approved remote access points. Once a connection is established, controller and access point exchange and verify each other's identities. This may be done through the exchange and verification of digital certificates. Provisioning information is downloaded from controller to remote access point and installed. This may be done via a tunnel such as an encrypted tunnel. Software updates may be applied. The provisioned remote access point is placed in operation. | 2010-12-09 |
20100313267 | SYSTEMS AND METHODS FOR EFFICIENT KEYWORD SPOTTING IN COMMUNICATION TRAFFIC - Methods and systems related to keyword searching processes. A list of keywords may be first represented by a set of short substrings. The substrings are selected such that an occurrence of a substring indicates a possible occurrence of one or more of the keywords. Input data may be initially pre-processed, so as to identify locations in the input data in which the substrings occur. Then, the identified locations are searched for occurrences of the actual keywords. The pre-processing scheme enables the keyword search process to search only in the identified locations of the substrings instead of over the entire input data. | 2010-12-09 |
20100313268 | METHOD FOR PROTECTING A COMPUTER AGAINST MALICIOUS SOFTWARE - A method of protecting a computer by having security software be set to clean mode where the clean mode acts as if files installed or modified before the clean date are safe and installed or modified after the clean date as potentially harmful. | 2010-12-09 |
20100313273 | Securing or Protecting from Theft, Social Security or Other Sensitive Numbers in a Computerized Environment - Use of a database/website or similar system, to store identification or other sensitive numbers, together with email addresses or other contact data in a linked association, for remote access by an organization to initiate usage notification to the true owner of the number collected, and to check a Fraud Alert status or similar setting for the number, and to compare the email address or other contact data obtained from a customer, not to include a PIN, to data stored in the database with the number collected, all of which, depending on the data components entered, will achieve deterrence of identity theft, rapid notification of number usage, rapid communication of a fraud alert or similar status, success or failure in obtaining or establishing an acceptable level of certainty that the customer is the true owner of the number, and a locking/unlocking capability for the number owners within the system domain. | 2010-12-09 |
20100313274 | IMAGE SERVER WITH MULTIPLE IMAGE CONFIDENTIALITY PORTS - Image servers, methods, software applications, and computer readable medium for retrieving images of various levels of patient anonymity via multiple image confidentiality software ports. In an image server, at least two image confidentiality software ports are provided, where each of the image confidentiality software ports is capable of providing images at a predetermined level of patient anonymity, and where the predetermined level of patient anonymity is different for each of the image confidentiality software ports. | 2010-12-09 |
20100313277 | METHOD FOR MANAGING ACCESS RIGHTS IN A SMART CARD - A method of managing access rights in a smart card, to subordinating execution of a command (Cmd | 2010-12-09 |
20100313278 | ASSOCIATING FIRST AND SECOND WATERMARKS WITH AUDIO OR VIDEO CONTENT - The present invention relates generally to processing audio or video content. One claim recites an apparatus comprising: electronic memory, and an electronic logic processor. The electronic memory is for storing data representing audio or video content, in which the data includes a protect watermark embedded therein, the protect watermark providing an indication that the data is protected, and in which the data further includes a rights watermark embedded in the data, the right watermark providing an indication of user rights associated with rendering the audio or video content, the protect watermark being more difficult to remove from the data relative to the rights watermark. The electronic logic processor is programmed for analyzing the data to retrieve the protect watermark only when the rights watermark does not exist in the data. Other claims are described and provided as well. | 2010-12-09 |
20100313283 | USES OF GDNF AND GDNF RECEPTOR - GDNFRα, GDNFRα extracellular domain (ECD), GDNFRα variants, chimeric GDNFRα (e.g., GDNFRα immunoadhesin), and antibodies which bind thereto (including agonist and neutralizing antibodies) are disclosed. Various uses for these molecules are described, including methods to modulate cell activity and survival by response to GDNFRα-ligands, for example GDNF, by providing GDNFRα to the cell. Also provided are methods for using GDNFRα, GDNF, or agonists thereof, separately or in complex, to treat kidney diseases. | 2010-12-09 |
20100313284 | MEANS AND METHODS FOR ELICITING AN IMMUNE RESPONSE - The invention provides means and methods for immunizing an animal against an antigen of interest, using stem cells, progenitor cells and/or dedifferentiated cells. | 2010-12-09 |
20100313285 | Altering High Density Lipoprotein Levels Through UDP-N-Acetyl-Alpha-D-Galactosamine: Polypeptide N-Acetlgalactosaminyltransferase (GALNT) Modulation - Described herein are methods for detecting and treating coronary artery disease and atherosclerotic conditions based on modulating the levels of total plasma lipoprotein and HDL-C by inhibiting expression or activity of GALNT. Also described herein are methods for identifying an agent(s) useful in treating coronary artery disease or atherosclerotic conditions. | 2010-12-09 |
20100313286 | G protein-related kinase mutants in essential hypertension - Disclosed are methods for identifying individuals predisposed to essential hypertension and related conditions such as salt sensitivity by detecting the presence of polymorphic or mutant forms of the GRK4 gene, or its expression product. Also disclosed are methods for identifying polymorphic or mutant GRK4s in individuals known to be suffering from such conditions, as well as methods and compositions for conducting drug discovery and therapeutic intervention. | 2010-12-09 |
20100313289 | POLYNUCLEOTIDES AND METHODS FOR ENHANCING SALINITY TOLERANCE IN PLANTS - The present invention relates to polypeptides, and polynucleotides encoding therefor, with cation transporter activity. In particular, the present invention relates to methods for producing, identifying, and/or breeding transgenic or non-transgenic plants, especially wheat or barley plants, with enhanced tolerance to saline and/or sodic soils, and/or reduced sodium accumulation in an aerial part of the plant. Also provided are plants produced using these methods. | 2010-12-09 |
20100313290 | MULTIPLEX ANALYSIS OF STACKED TRANSGENIC PROTEIN - The invention relates to methods for multiplex analysis of complex protein samples from plants using mass spectroscopy. In some embodiments, the disclosure concerns methods for maintaining a transgenic plant variety, for example by analyzing generations of a transgenic plant variety for presence and concentration of multiplexed transgenic proteins. | 2010-12-09 |
20100313291 | Methods for Improving the Yield of Cucumber Plants - The present invention relates to a plant of a cucumber breeding line having an introgression from cucumber accession PI 169383, a representative sample of seed of which has been deposited with the NCIMB, Aberdeen, Scotland under accession number NCIMB 41532 and depositors reference PI169383, wherein said introgression is an introgression on linkage group 4 associated with increased yield of said plants, wherein said plant exhibits an increased yield relative a plant of said cucumber breeding line lacking said introgression, and wherein said increased yield refers to a higher total fruit weight per plant. | 2010-12-09 |
20100313292 | NUCLEOTIDE SEQUENCES MEDIATING PLANT MALE FERTILITY AND METHOD OF USING SAME - Nucleotide sequences mediating male fertility in plants are described, with DNA molecule and amino acid sequences set forth. Promoter sequences and their essential regions are also identified. The nucleotide sequences are useful in mediating male fertility in plants. In one such method, the homozygous recessive condition of male sterility causing alleles is maintained after crossing with a second plant, where the second plant contains a restoring transgene construct having a nucleotide sequence which reverses the homozygous condition. The restoring sequence is linked with a hemizygous sequence encoding a product inhibiting formation or function of male gametes. The maintainer plant produces only viable male gametes which do not contain the restoring transgene construct. Increase of the maintainer plant is also provided by self-fertilization, and selection for seed or plants which contain the construct. | 2010-12-09 |
20100313297 | Phosphate use efficiency - Isolated polynucleotides and polypeptides encoded thereby are described, together with the use of those products for making transgenic plants with increased tolerance to pH or increased phosphorus efficiency. | 2010-12-09 |
20100313298 | EXPRESSION CASSETTE, T-DNA MOLECULE, PLANT EXPRESSION VECTOR, TRANSGENIC PLANT CELL AS WELL AS THEIR USE IN THE MANUFACTURING OF A VACCINE - The described binary vector with containing the expression cassette of the S-HBsAg protein under the control of the constitutive 35S promoter as well as the method of transforming lettuce using a strain of | 2010-12-09 |
20100313302 | Viral Promoter, Truncations Thereof, and Methods of Use - The present disclosure provides compositions and methods for regulating expression of heterologous nucleotide sequences in a plant. Compositions include a novel nucleotide sequence for a promoter. A method for expressing a heterologous nucleotide sequence in a plant using the promoter sequence disclosed herein is provided. The method comprises stably incorporating into the genome of a plant cell a nucleotide sequence operably linked to the promoter of the present invention and regenerating a stably transformed plant that expresses the nucleotide sequence. | 2010-12-09 |
20100313303 | TRANSGENIC BIOLUMINESCENT PLANTS - Transgenic plants, and a method for making the same, wherein genes encoding the enzyme luciferase and its corresponding substrate luciferin are incorporated into a native plant genome. Once transformed into plant cells, these genes may be regulated such that under certain endogenous or exogenous conditions, their expression in the mature plant results in bioluminescence. Different luciferin/luciferase complexes and/or mechanisms of regulation may be utilized for these transgenic plants, depending on a variety of factors such as plant species and the circumstances under which a bioluminescent reaction is desired. Phototransformation may be utilized to vary the wavelength of light emitted from the mature plant. | 2010-12-09 |
20100313304 | Engineering single-gene-controlled staygreen potential into plants - The enzymes of the ACC synthase family are used in producing ethylene. Nucleotide and polypeptide sequences of ACC synthases are provided along with knockout plant cells having inhibition in expression and/or activity in an ACC synthase and knockout plants displaying a staygreen phenotype, a male sterility phenotype, or an inhibition in ethylene production. Methods for modulating staygreen potential in plants, methods for modulating sterility in plants, and methods for inhibiting ethylene production in plants are also provided. | 2010-12-09 |
20100313307 | PROTEIN PRODUCTION AND STORAGE IN PLANTS - A transgenic dicotyledonous plant having a deficiency of one or more plant seed storage proteins, further having a transgenic polynucleotide construct comprising an open reading frame operably linked to a storage protein promoter and an ER signal sequence. The polynucleotide construct encodes a protein product that can accumulate at high levels in the seed. Also provided are methods of producing a heterologous protein in a plant seed. | 2010-12-09 |
20100313308 | PLANTS HAVING ALTERED GROWTH AND/OR DEVELOPMENT AND A METHOD FOR MAKING THE SAME - The present invention relates generally to the field of molecular biology and concerns a method for altering variouse aspects of plant growth and/or development by modulating expression in a plant of a nucleic acid encoding an UBiquitin-Specific Protease (UBP) of the UBP15 subfamily or a homologue thereof. The present invention also concerns plants having modulated expression of a nucleic acid encoding a UBP 15 or a homologue thereof, which plants have altered growth and/or development relative to corresponding wild type plants or other control plants. The invention also provides constructs useful in the methods of the invention. | 2010-12-09 |
20100313313 | Blueberry Plant named 'C95-12' - A new and distinct cultivar of blueberry ( | 2010-12-09 |
20100313314 | Blueberry plant named 'C00-09' - A new and distinct cultivar of blueberry ( | 2010-12-09 |
20100313315 | Blueberry plant named 'C01-43' - A new and distinct cultivar of blueberry ( | 2010-12-09 |
20100313316 | GRAPEVINE 'IFG 68-175' - This invention is a new and distinct grapevine variety denominated ‘IFG 68-175’. ‘IFG 68-175’ is characterized by producing large bright red, crisp, uniform berries with high sugar content borne on medium size clusters. The fruit ripen and are commercially harvestable from late August to mid-September. Berries color fully even under adverse conditions and do not darken excessively throughout the harvestable period. | 2010-12-09 |
20100313319 | Dracaena plant named "2004027J" - A new and distinct | 2010-12-09 |