02nd week of 2010 patent applcation highlights part 59 |
Patent application number | Title | Published |
20100011366 | Dynamic Resource Allocation - A computer-implemented method includes detecting an actual workload representative of a pattern of access of a plurality of items of content; comparing the actual workload against a prescriptive workload to determine an occurrence of a substantial deviation from the prescriptive workload; and upon determining the occurrence of the substantial deviation, revising the prescriptive workload based at least in part on the actual workload. The plurality of items is stored on resources of a storage environment according to one of a plurality of resource allocation arrangements. The prescriptive workload including a plurality of categories, each category being associated with a respective one of the plurality of resource allocation arrangements. | 2010-01-14 |
20100011367 | METHODS AND SYSTEMS FOR ALLOCATING A RESOURCE OF A VEHICLE AMONG A PLURALITY OF USES FOR THE RESOURCE - A method for implementing a request pertaining to a requested use of a plurality of uses of a resource of a vehicle includes the steps of determining whether the resource is configured for simultaneous use by two or more of the plurality of uses, determining whether the resource is being used by an existing use of the plurality of uses, and allowing the requested use of the resource and the existing use of the resource, if the resource is configured for simultaneous use by two or more of the plurality of uses and the resource is being used by the existing use. | 2010-01-14 |
20100011368 | Methods, systems and programs for partitioned storage resources and services in dynamically reorganized storage platforms - Exemplary embodiments establish durable partitions that are unified across storage systems and storage server computers. The partitions provide independent name spaces and are able to maintain specified services and conditions regardless of operations taking place in other partitions, and regardless of configuration changes in the information system. A management computer manages and assigns resources and functions provided by storage server computers and storage systems to each partition. By using the assigned resources, a partition is able to provide storage and other services to users and applications on host computers. When a configuration change occurs, such as addition or deletion of equipment, the management computer performs reassignment of resources, manages migration of services and/or data, and otherwise maintains the functionality of the partition for the user or application. Additionally, a partition can be migrated within the information system for various purposes, such as improved performance, load balancing, and the like. | 2010-01-14 |
20100011369 | DEVICE MANAGEMENT APPARATUS, JOB FLOW PROCESSING METHOD, AND TASK COOPERATIVE PROCESSING SYSTEM - In a task cooperative processing system that allows a plurality of task processing devices to execute a plurality of tasks performed on document data as a job flow, task processing devices that can execute a task included in the job flow are decided as candidate task processing devices (S | 2010-01-14 |
20100011370 | CONTROL UNIT, DISTRIBUTED PROCESSING SYSTEM, AND METHOD OF DISTRIBUTED PROCESSING - A control unit includes a determination section that determines information on a type and a function of processing elements connected thereto, a library loading section that loads, as needed, program information or reconfiguration information for hardware included in a connected library into the processing elements, and execution transition information control section that creates, based on information on an arbitrary service comprising a combination of one or more tasks to be executed by the processing elements and information on the type and the function of the processing elements determined by the determination section, execution transition information specifying a combination of processing elements corresponding to the information on service and transmits it to the processing elements. | 2010-01-14 |
20100011371 | Performance of unary bulk IO operations on virtual disks by interleaving - A method and system are provided for executing a unary bulk input/output operation on a virtual disk using interleaving. The performance improvement due to the method is expected to increase as more information about the configuration of the virtual disk and its implementation are taken into account. Performance factors considered may include contention among tasks implementing the parallel process, load on the storage system from other processes, performance characteristics of components of the storage system, and the virtualization relationships (e.g., mirroring, striping, and concatenation) among physical and virtual storage devices within the virtual configuration. | 2010-01-14 |
20100011372 | Method and system for synchronizing the execution of a critical code section - The invention concerns a method for synchronizing the execution of at least one critical code section (C | 2010-01-14 |
20100011373 | Shared Persistent Communication Thread - A computer-implemented method and system organizes communications by combining and integrating distinct communication events conducted through diverse communication modes into to a single conversation. Notification of an occurrence of an event is received and, in response to the notification, a conversation object representing a conversation is generated. A plurality of participants is associated with the conversation. A communication entry is associated with the conversation object. The communication entry has a message for at least one of the participants. The conversation object and the communication entry are stored in persistent memory. Shared access to the conversation object stored in persistent memory is limited to the plurality of participants associated with the conversation. | 2010-01-14 |
20100011374 | OPEN FRAMEWORK SYSTEM FOR HETEROGENEOUS COMPUTING AND SERVICE INTEGRATION - An open framework system for both heterogeneous computing and service integration is provided. The open framework system for both heterogeneous computing and service integration according to the present invention comprises a plurality of Wrappers both registering and administrating services by service having similar function, a framework transferring an execution result of a service to the applications after discovering the service through the Wrappers and invocating the service in case of receiving a message requesting the service from the applications, a message broker transferring messages between the applications and the framework, and an external module converting the protocols for meeting specification of the Wrapper for an existing service in an open framework system for both heterogeneous computing and service integration efficiently establishing USS (Ubiquitous Smart Space) by systematically integrating services of various protocols using in a plurality of applications under ubiquitous environment. Since the application developed at the open framework system for both heterogeneous computing and service integration according to the present invention is self-existent for even changes of both service and environment, there is no need for the application to be amended in case that the services are further deleted or amended. Therefore, the life period of the application may be prolonged. | 2010-01-14 |
20100011375 | Zero-install IP security - In an embodiment of a method of and system for secure communication, a computer system comprises a primary system protocol stack operative in kernel space and interfacing with an external network. A secondary system protocol stack, security software, and at least one application program operate in user space, and may be provided on a portable storage medium by a user who does not have privileges to install programs in kernel space. The application program interfaces with the secondary system protocol stack. The secondary system protocol stack interfaces with the primary system protocol stack. The security software operates on communications through the secondary system protocol stack. | 2010-01-14 |
20100011376 | INVOCATION CHANNEL - Creating interoperability between a calling entity and an external service includes configuring an invocation channel using codeless process, designating the external service, passing source data from the calling entity to the invocation channel, the invocation channel formatting the data, invoking a connection to the external service, and passing the data over the connection to the external service. | 2010-01-14 |
20100011377 | APPLICATION EXECUTING TERMINAL - An application executing unit | 2010-01-14 |
20100011378 | PORTABLE ELECTRONIC DEVICE AND METHOD FOR SCHEDULING SESSIONS - A portable electronic device and method for scheduling sessions in a portable electronic device is provided. The device provides a session manager. The session manager provides different types of sessions between multimedia services and multimedia drivers in the device. Each session comprises one or more statuses directed at controlling allotment of the multimedia services to applications. The session manager coordinates the statuses of the sessions if a service has modified a status of a corresponding session. The session manager provides callbacks to notify a corresponding service when a status of the corresponding session has been coordinated. | 2010-01-14 |
20100011379 | Methods, Systems and Media for Installing Peripheral Software Drivers - A method for installing peripheral software drivers including storing a first identifier for a peripheral device meant for compatible operation with an information handling system (IHS) in the non-volatile memory of the basic input/output system (BIOS) of the IHS, matching the peripheral device represented by the first identifier with compatible driver releases represented by a second identifier, sorting the compatible driver releases by priority and installing a highest priority driver release on the IHS. | 2010-01-14 |
20100011380 | SYSTEM AND METHOD FOR REPLACING DEVICE DRIVERS - Disclosed is a method system and application for replacing device drivers on an operating system associated with a computing platform. According to some embodiments of the present invention, an operating system may be configured to use a set of device drivers corresponding to the hardware installed on the computing platform. In the event of a change of hardware, the installed device drivers need to be adapted to the new devices. | 2010-01-14 |
20100011381 | MAPE loop performance on system-wide basis - A manage-analyze-plan-execute (MAPE) loop is performed on a system-wide basis in relation to subsystems of a computing system based on one or more parameters. Performing the MAPE loop results in a performance level at which each subsystem is to operate to conserve energy utilization on the system-wide basis such that the computing system still satisfies the parameters. The subsystem the performance level at which each subsystem is to operate is communicated to the subsystem. Each subsystem operates at the performance level communicated to the subsystem. | 2010-01-14 |
20100011382 | METHOD, CONTROL LOGIC AND SYSTEM FOR DETECTING A VIRTUAL STORAGE VOLUME AND DATA CARRIER - A method, corresponding control logic, and a correspond system for detecting a virtual storage volume. The method includes: determining a first access pattern for a read operation of a target storage volume; monitoring a second access pattern of at least one other storage volume of a computer system during the read operation; determining a correlation between the first access pattern and the second access pattern; and deriving that the target storage volume is a virtual storage volume if the determined correlation is above a predefined threshold. | 2010-01-14 |
20100011383 | Method for file handling in network switch stacking - A method for handling file operations in switch stacking is described. Plurality of switches connected in switch stack is managed by master switch. When user configurations are stored in master switch also transferred to other stack members for redundancy. This invention discloses a method using a stack file module to handle the file update to remote stack members. The stack file module uses Remote Procedure Call (RPC) mechanism to access remote stack member file system. The stack file module also uses a buffering mechanism and error prediction mechanism for performance benefits. The stack file module also adjusts the size of the buffer based on the amount and frequency of data written to remote stack members. | 2010-01-14 |
20100011384 | CRACK-PROOF DEVICE FOR AN OPTICAL DISK DRIVE - The invention provides a crack-proof device for an optical disk drive. The crack-proof device includes a casing whereon an opening is formed on a front end. The crack-proof device further includes a plank row extending downward from an upper edge of the opening for blocking the opening partly, a tray disposed inside the casing in a slidable manner, whereon a recession is formed for loading an optical disk, and at least one block wall protruding from an upper surface of the tray and located between an front end of the tray and the recession. When the tray is positioned inside the casing, the block wall and the plank row are staggered for reducing a vertical gap between them. | 2010-01-14 |
20100011385 | COMPACT DISK FEEDING MECHANISM - A compact disc (CD) feeding mechanism includes a base internally defining a moving passage, and a CD inlet and a CD outlet communicating with an upper and a lower end of the moving passage, respectively, and having a first and a second supporting wall spaced by a shifting path and radially projected into a left side of the CD inlet, an overall length extending along the two supporting walls and the shifting path being larger than one half of the outer circumference of a CD, so that a plurality of CDs may be stacked on the two supporting walls; a driving unit mounted below the base and electrically connected to an external power supply; and a shifting unit including a shifting section driven by the driving unit to shift a lowest one of the stacked CDs out of the supporting walls into the moving passage to the CD outlet. | 2010-01-14 |
20100011386 | DISK APPARATUS - Requirement: An object of the present invention is to provide a disk apparatus that includes a vibration-damping mechanism capable of substantially curbing vibrations due to eccentricity of the center of gravity of a discoid recording medium, caused to a drive chassis on which mounted are a motor for rotationally driving the discoid recording medium, and a record-playback unit for recording a digital signal onto and/or playing that back from the discoid recording medium. | 2010-01-14 |
20100011387 | METHOD FOR VALIDATING ACCESS TO A PRODUCT BY MEANS OF A SECURITY MODULE - A method for validating access to a product by a security module associated with a user unit unidirectionally connected to a managing center MC transmitting management messages being generated following the receipt of a request for an access right to the product, said method comprises the steps of purchasing a product, determining a code representing the product, displaying said code on a display device, transmitting to the MC, a request comprising said code and an security module identifier, transmitting a right confirmation message addressed to the user unit associated with said security module, wherein, at purchasing of the product, a temporary right is registered in the security module, said temporary right being replaced by a definitive right by the right confirmation message received from the MC, said definitive right authorizing the access to the purchased product by debiting the value amount associated with said product. | 2010-01-14 |
20100011388 | System and method for creating playlists based on mood - Suggested media playlists are created by an electronic device based upon the mood of a user as analyzed by the electronic device. The electronic device may suggest media items for playback based upon the user's past preferences for certain media items during previously similar moods. | 2010-01-14 |
20100011389 | SYSTEM FOR GATHERING TV AUDIENCE RATING IN REAL TIME IN INTERNET PROTOCOL TELEVISION NETWORK AND METHOD THEREOF - A system for surveying audience ratings in real-time in an Internet protocol TV (IPTV) network and a method thereof are provided. The system for surveying audience ratings in real-time includes an electronic program guide (EPG) server providing channel information and audience rating survey server information to an IPTV client; the IPTV client outputting periodically reception information including channel and subscriber information, the channel being received after being selected based on the channel information; and an audience rating survey server surveying audience ratings based on the reception information. According to the system and method, the addition of any information in a broadcasting stream is not required for an audience rating survey, additional devices are not requested to be installed in the houses of viewers or listeners, and without the necessity of their cooperation, audience ratings can be automatically performed in real-time. | 2010-01-14 |
20100011390 | Method and Configuration for Storing and Playing Back TV Transmissions - An improved method and configuration for operating a network containing a personal video recorder server having measures for receiving several digitally encoded TV channels, for feeding several terminals and for recording storable TV programs. The terminals have measures for selecting storable TV programs and measures for transmitting the choice to the PVR server. The configuration contains a first database in which the index of TV programs stored by the PVR in response to the selection produced by the terminal is recorded. The first database controls authorization or refusal to play back the stored programs on the terminal. A second database stores, for the first terminal, the other terminals authorized to play back the TV programs selected by the user of the first terminal or all TV programs associated therewith by the first data base index. Terminals that are not contained in the second database are not authorized. | 2010-01-14 |
20100011391 | Decoder-specific content provision system and method - A system for providing decoder-specific content is provided. The system includes a receiver list system receiving a receiver identifier and transmitting authentication data to a receiver. A receiver authentication system receives the authentication data and transmits content delivery data to a content server, such as data that authorizes the content server to provide content to the receiver. A receiver update system transmits update data to the receiver, such as a list of available channels of content. | 2010-01-14 |
20100011392 | Methods and Systems For Media Content Control - The described systems and methods control the display of media content on a media player with player preferences. The media content is analyzed and multiple signatures are computed that are representative of temporal portions of the media content. The multiple signatures are matched to a database of signatures, and a closest corresponding signature is found. Metadata associated with the closest corresponding signatures is retrieved as matching metadata. Display of the media content is controlled based on the player preferences and the matching metadata. | 2010-01-14 |
20100011393 | DISTRIBUTED AND SECURED METHOD AND SYSTEM FOR PROTECTING AND DISTRIBUTING AUDIO-VISUAL FLOWS - A process for secure distribution of digital audiovisual streams according to a standard, normalized or proprietary format, on which streams a separation of the stream into two parts is made prior to transmission to equipment of an addressee to generate a modified main stream having a format of the original stream and complementary information of any format including digital information suitable to permit reconstruction of the original stream, wherein a transmission is made, by separate paths during distribution of the modified main stream from a distribution server and of the complementary information to the equipment of the addressee from a secure central server passing via at least one local server connecting the equipment of the addressee to the local server via at least one access point. | 2010-01-14 |
20100011394 | METHOD FOR PROVIDING WIDGETS AND TV USING THE SAME - A method for providing widgets and a TV using the same are disclosed. The method for providing widgets includes searching for widgets related to a certain keyword or a broadcast program among widgets provided by a plurality of content providers, and displaying the searched widgets on a widget search list classified according to content provider. A user can thereby search for and use the widgets provided from various content providers more easily. | 2010-01-14 |
20100011395 | Information processing unit - An information processing unit includes: a receiving unit which receives, via a communication network, first specifying information which is used by a content source to specify the content, from a display device which receives and displays broadcast content; a converting unit which, upon retrieval request from the display device for related information which is related to the content, converts the first specifying information into second specifying information, which is used by a source of the related information to specify the content; a retrieval controlling unit which transmits the second specifying information to a retrieval device, which retrieves the related information based on the second specifying information, via the communication network and controls retrieval of the related information; and a providing unit which provides the display device with the related information acquired from the retrieval device via the communication network upon retrieval request for the related information to the retrieval device. | 2010-01-14 |
20100011396 | PROGRAM GUIDE PRINTING DEVICE AND METHOD OF PRINTING PROGRAM GUIDE USING THE PROGRAM GUIDE PRINTING DEVICE - A program guide printing device receives program information and generates program guide print data from the received program information. In printing of the program guide, in a blank region occurring in a program frame for displaying program name and the like of each program, not only program information of another program or additional information such as advertisement information, program topics, whether forecast, and text, but also images are printed. Thus, printing of a program guide using a limited area effectively can be carried out. | 2010-01-14 |
20100011397 | PACKET TIMING METHOD AND APPARATUS OF A RECEIVER SYSTEM FOR CONTROLLING DIGITAL TV PROGRAM START TIME - A system for the delivery of video on demand (VOD). A wireless remote control device generates keystroke signals for controlling a TV display and has a single button for restarting a selected program at a beginning of the selected program. A head-end unit supports separate downstream virtual channels for each separate TV set connected on a common TV feeder-cable; The head-end unit locally records and stores many programs, and transmits each program using a compressed digital format. The Compressed digital format may use MPEG-2 or MPEG-4. The head-end unit has means for protecting against signal theft. A set top unit encapsulates the keystroke signals and transmits the keystroke signals via a two-way channel to the head-end unit. | 2010-01-14 |
20100011398 | Method and System for Automatic IP TV Program Generation - According to this invention content can be uploaded by an upload device ( | 2010-01-14 |
20100011399 | VIDEO PROCESSING APPARATUS, VIDEO PROCESSING SYSTEM INCLUDING THE SAME, AND INFORMATION PROVIDING METHOD IN VIDEO PROCESSING APPARATUS - There are provided a video processing apparatus, a video processing system, and an information providing method in the video processing apparatus. The video processing apparatus includes: a communication part performing communication with a service providing server providing broadcasting services; a video processing part performing video processing with respect to the broadcasting services; an output part outputting information on the broadcasting services; and a controller controlling the communication part, the output part and the video processing part to transmit user information and viewing information with respect to the video processing apparatus to the service providing server, to receive recommendation information based on the user information and the viewing information from the service providing server, and to output the received recommendation information, respectively. | 2010-01-14 |
20100011400 | APPARATUS AND METHOD FOR EXTENDING DOCSIS CABLE MODEM SERVICE OVER WIRELESS LINKS - An apparatus and method are presented to allow the extension of a DOCSIS cable modem service over a wireless link. According to the invention a wireless hub transceiver is connected to a distribution coax cable of a DOCSIS based system. The downstream data are transferred over a wireless link to a remote subscriber radio frequency (RF) unit connected to a cable modem that provides the downstream data to the subscriber. Similarly, upstream data are sent from the subscriber cable modem over the wireless link to the wireless hub transceiver where such data are inserted back to the distribution coax cable. | 2010-01-14 |
20100011401 | METHOD, SYSTEM AND APPARATUS FOR APPLYING TERMINAL CAPABILITY INFORMATION IN IPTV SERVICE - A system, an apparatus and a method for applying terminal capability information in an IPTV service are provided. The system includes a user equipment (UE), a Core IP multimedia subsystem (Core IMS), a device profile function (DPF) and an application server, wherein, the UE is configured to transmit the terminal capability information and receive the IPTV service; the Core IMS is configured to forward the terminal capability information received from the user equipment to the DPF; the DPF is configured to transmit the terminal capability information to the application server; and the application server is configured to provide the IPTV service for the UE according to the terminal capability information. The method comprises: receiving terminal capability information transmitted by a UE via a Core IMS; providing the IPTV service for the UE according to the acquired terminal capability information. | 2010-01-14 |
20100011402 | COMMUNICATION APPARATUS AND COMMUNICATION METHOD - A communication apparatus for receiving video data transmitted by streaming from a transmission apparatus via a transmission path includes a video data reception unit configured to receive the video data, a reception data monitoring unit configured to monitor a processing status of the video data received by the video data reception unit, and a control request transmission unit configured to transmit a playback control request for the video data to the transmission apparatus, wherein, when the video data is played back at a playback speed, if the reception data monitoring unit determines that the playback speed exceeds a transmission capacity of the transmission path or a processing capacity of the communication apparatus, the control request transmission unit transmits to the transmission apparatus a playback control request to request only intra-picture coded video data. | 2010-01-14 |
20100011403 | SYSTEM AND METHOD FOR TRANSMITTING FILES FROM A SENDER TO A RECEIVER IN A TELEVISION DISTRIBUTION NETWORK - A system and method for transmitting files from a sender to a receiver in a television distribution system, for example, a cable television distribution network, is provided. The files are transmitted without the need for transmitting a directory over an out of band communications link. In an exemplary embodiment, a filename corresponding to a file to be transmitted is provided to a transform. The transform calculates a PID based on the filename. The calculated PID is incorporated into the MPEG2 data stream carrying the corresponding file contents. When an application program running in the receiver requests a file, the filename of the requested file is provided to a transform operating in the receiver. The transmitter and receiver transforms are identical. The transform provides a corresponding PID at its output. The PID is used to tune a PID filter on the receiver end such that the requested file is selected from the incoming MPEG bit stream for processing by the processor. | 2010-01-14 |
20100011404 | TV SOFTWARE UPGRADE USING TV INTERNET ADAPTER - A TV Internet adapter receives an upgrade request for TV software, downloads an updated software image, and then changes mode through software emulation into a mass storage device from which the TV downloads the updated image. | 2010-01-14 |
20100011405 | Method and Apparatus for Audio Selection - Method and apparatus for providing alternate audio data for a received broadcast media stream. In one embodiment, a method may include receiving a broadcast media stream including video data and audio data and detecting a channel setting of the receiving device, wherein the channel setting includes audio data associated with a channel of the broadcasted media stream. The method may further include detecting an audio setting associated with the channel of the broadcast media stream, wherein the audio setting corresponds to a user preferred audio data for the channel and outputting the video data and the audio data of the received broadcast media stream based, at least in part, on the user preferred audio data. | 2010-01-14 |
20100011406 | METHOD FOR FEEDING BACK FAILURES OF SET-TOP BOXES - A method for feeding back failures of a set-top box (STB), includes: providing a Universal Serial Bus (USB) storage device with a diagnostic program and a reporting program; inserting the USB storage device into the STB; loading the diagnostic program from the USB storage device to the STB; running the diagnostic program to find failures within the STB; writing the failures of the STB to the USB storage device; inserting the USB storage device into a network device; and running the reporting program by the network device to feed back the failures of the STB to a remote server. | 2010-01-14 |
20100011407 | METHOD AND SYSTEM FOR PLAYLIST SYNCHRONIZATION - Embodiments of the present invention provide a method and system for synchronizing the playlists of department channels or groups of department channels. In one embodiment of the present invention, the playlists of department channels or groups of department channels are synchronized to endpoints defined in a global playlist schedule. That is, channels not having a termination/end point consistent with the endpoints defined by said global playlist schedule are padded with respective filler content (media) to coordinate the termination points of the channels to be synchronized. The amount of filler content needed for each channel is determined respectively for a channel. | 2010-01-14 |
20100011408 | Implementing Organization-Specific Policy During Establishment of an Autonomous Connection Between Computer Resources - An organization-specific policy is implemented during establishment of an autonomous connection between computer resources includes evaluating a relative priority between default credentials and alternative credentials; and using the highest priority credentials to establish a connection between the computer resources. The alternative credentials are based organization-specific policy and provide for autonomous connections between computer resources differently than the default credentials. | 2010-01-14 |
20100011409 | NON-INTERACTIVE INFORMATION CARD TOKEN GENERATION - Systems and methods for automatic, non-interactive generation of information card tokens are provided. An apparatus can include a receiver, a transmitter, and an information card token generator, wherein the information card token generator is operable to generate an information card token in response to an information card token request received from a relying party site, the information card security token being based at least in part on a user-defined policy. | 2010-01-14 |
20100011410 | SYSTEM AND METHOD FOR DATA MINING AND SECURITY POLICY MANAGEMENT - A system and method to generate and maintain controlled growth DAG are described. The controlled growth DAG conveys information about objects captured by a capture system. | 2010-01-14 |
20100011411 | Policy-Based Usage of Computing Assets - Policy is defined for usage of computing assets (including remote, or external, assets) in a computing environment. The policy may identify the assets by (for example) asset name, asset type, asset version, location in a repository, or some combination thereof. Policy definitions for remote assets are provided in a consistent manner. Policy for particular assets (for example) may vary from one role to another. Policy definitions are preferably used when initializing a computing environment, and also when subsequently importing an asset into that computing environment. The disclosed techniques may also, or alternatively, be used to ensure that a secure computing environment is created whereby only hardware and/or software in a policy can be installed into the computing environment. | 2010-01-14 |
20100011412 | METHOD FOR MANAGING CRYPTOGRAPHIC EQUIPMENT WITH A UNIFIED ADMINISTRATION - A unified and universal management system for one or more items of cryptographic equipment, comprising a federating portal that is adapted to allow a user to access services, one or more interfaces for the interchange of information between the management system and equipment outside the system, one or more modules having one or more sub-modules or technological bricks suitable to carry out a unified and universal management method. | 2010-01-14 |
20100011413 | METHOD FOR AND APPARATUS FOR RETRIEVING USERNAME AND PASSWORD IN AN AUTHENTICATION PROTOCOL - Disclosed is a computer implemented method and apparatus to retrieve authentication records required for user validation and creation of authentication credentials from an authentication sever to be passed to the user. The method is comprised of the authentication server storing a first authentication record, then generating a first authentication credential based on the first authentication record. The authentication server associates the first authentication record with a first credential expiration time. The authentication server stores a second authentication record. The authentication server generates a second authentication credential based on the second authentication record, wherein the second authentication credential is associated with a second credential expiration time. Next, the authentication server associates the second authentication credential with a second credential expiration time. The authentication server determines that the first credential expiration time is earlier than the second credential expiration time and caches the first authentication record to cache. | 2010-01-14 |
20100011414 | MANAGING LOGICAL SOCKETS - Network attacks, such as a denial of service (DoS) attack, attempt to exhaust server resources and can cause a network to be unavailable for significant periods of time. Although a firewall can be utilized to defend a system from network attacks, the number of incoming connections created can be controlled to defend the system against network attacks. An operating system creates connections, known as sockets, on one or more logical ports. Incoming connections are connections whose creation requests originate from a source outside the operating system. Functionality to control socket creation can be implemented within the operating system, thus allowing a system to be placed directly on a network without a firewall. Implementing defense against network attacks within an operating system reduces the additional cost of having firewall products, and can lead to more efficient network configurations. | 2010-01-14 |
20100011415 | SYSTEM AND METHOD FOR PROCESSING AN UPLOAD OF A PROGRAM WITH EXPORT COMPLIANCE INFORMATION - Disclosed herein are systems, methods, and computer readable-media for processing a program with export compliance information, the method including in a process of ingesting a program from a developer to an online store, presenting a request to the developer to indicate if the program contains encryption, upon indication that the program contains encryption, presenting an interface for the developer to upload an appropriate export compliance form, blocking the program from the online store if the appropriate export compliance form is not received, and upon receipt of the appropriate export compliance form, receiving and ingesting the program from the developer into the online store. In one aspect, the method further presents an interface to the developer to upload one export compliance form associated with multiple programs. In another aspect, the export compliance form is bundled with the program for distribution in the online store. The method can include blocking the program from the online store if the program does not meet one or more additional requirements. In one aspect, the appropriate export compliance form is transmitted to a reviewing body for approval before completely ingesting the program. The reviewing body may notify the developer of approval or rejection of the export compliance form. | 2010-01-14 |
20100011416 | DOCUMENT STORAGE ACCESS ON AN UNSOLICITED TRANSFER BASIS - Systems and methods of the present invention allow a file owner to upload and store a file to a File Storage Area. Through a series of communications, a file owner may provide an intended file recipient access to the file without a request by a file requester. The file owner may grant permissions to access the file and notify the intended file recipient of the results. | 2010-01-14 |
20100011417 | SYSTEM AND METHOD FOR PRIVILEGE MANAGEMENT AND REVOCATION - The present disclosure relates generally to the management of privileges associated with certain applications that are accessible by users of electronic equipment, such as, for example, networked computers, mobile wireless communications devices, and the like. In particular, the disclosure is directed to systems and methods for managing privileges associated with particular applications and for revoking these privileges in a timely and robust manner. For example, the device keeps track of which applications get access to which privileges. When policies or application control changes, the system detects which privileges have been revoked for which applications. This can be accomplished by simply comparing the old set of privileges with the new set of privileges. For each revoked privilege for a given application, the system determines if the application has ever accessed that privilege in the past. If an application has accessed a privilege that is now revoked at any time in the past, the device is reset. To ensure that privileges that may be passed between applications are not overlooked, the device is arranged to perform a reset if any revoked privilege accessible by the device is one that may be passed between applications. | 2010-01-14 |
20100011418 | KEY CONTROL WITH REAL TIME COMMUNICATIONS TO REMOTE LOCATIONS - A key control system includes at least one premise, a lockbox capable of securing a key to the premise and at least one mobile telephone associated with a user and having a stored access device program capable of communicating an access request to the lockbox. The premise is subject to authorized access by others, such as the user, based on preferences of an approval party established with the system. If specified by these preferences, the mobile telephone automatically initiates a communication to a selected destination to request approval of the access request. | 2010-01-14 |
20100011419 | Authentication method using icon password - A method of authenticating a user of a terminal operating a server and connected to the terminal through a communication network, in which a password needed for authentication is inputted as icons, rather than numerals or characters, thereby preventing leakage or theft of the password. Through the present invention, security is improved in processing a password in an information processing device or a communication network, and furthermore, leakage of the password is fundamentally prevented in the process of inputting the password by a user. Therefore, an effect of securing reliability of the overall authentication process may be obtained. | 2010-01-14 |
20100011420 | OPERATING A SERVICE ON A NETWORK AS A DOMAIN NAME SYSTEM SERVER - Operating a service such as a remote database as a dns server, receiving inputs such as queries as domain names and transmitting replies in the format of IPv4 or IPv6 addresses. | 2010-01-14 |
20100011421 | ENABLING AUTHENTICATION OF OPENID USER WHEN REQUESTED IDENTITY PROVIDER IS UNAVAILABLE - A method, system and computer program product for enabling authentication of an OpenID user when a requested identity provider is unavailable. A relying party receives a login request from the OpenID user, where the login request includes a username. The relying party reads a list of trusted identity providers that are associated with the received username and selects one of those identity providers. The relying party generating an OpenID identifier using an identification (e.g., Uniform Resource Locator) of the selected identity provider and the username. The relying party transmits an authentication request (request to authenticate the OpenID user) to the selected identity provider using the formed OpenID identifier. If the selected identity provider is unavailable, then the relying party selects another identity provider from the list of identity providers that are associated with the received username and repeats the above process. | 2010-01-14 |
20100011422 | PORTABLE ACCOUNT INFORMATION - A method of providing portable account information includes associating two accounts ( | 2010-01-14 |
20100011423 | User identification system and a method thereof - A service providing system using the biometrics identification without inputting the user ID poses the problem that the consideration of a service is erroneously claimed to the registered user not using the service due to the erroneous identification. According to this invention, the threshold of the value of the degree of similarity for user identification is set strictly for each registered biometrics information of the user in accordance with the declaration of the loss caused by the erroneous identification. | 2010-01-14 |
20100011424 | INFORMATION PROCESSING APPARATUS, METHOD FOR CONTROLLING INFORMATION PROCESSING APPARATUS, RECORDING MEDIUM, AND PROGRAM - An information processing apparatus not having an input device for receiving specific authentication information can access another information processing apparatus requiring the specific authentication information while suppressing a decrease in a security level. A control method for controlling an information processing apparatus includes authenticating a user using authentication information, receiving an access request from another apparatus, and requesting the other apparatus to send the authentication information in response to reception of the access request from the other apparatus. When the other apparatus does not have an inputting unit for inputting the requested authentication information, the requesting step includes requesting a predetermined substitute apparatus having the inputting unit to send the authentication information. The authenticating step includes authenticating the user based on the authentication information sent from the predetermined substitute apparatus in response to the request made at the requesting step. | 2010-01-14 |
20100011425 | System And Method For Making a Content Item, Resident Or Accessible On One Resource, Available Through Another - Systems and methods are provided to make content items, already available on one resource, also available through another, such as through a new location or resource. The content items may be, e.g., videos uploaded by a user or other content. The systems and methods employ a streamlined interface for convenience to the user. In one example, a user of a computer system views a video segment through a first website and re-posts the video segment to a second website by entering a single command or clicking a single button. The websites coordinate the re-posting using credentials previously or contemporaneously entered by the user. Moreover, a content item may be automatically prepared for re-posting on the target web site using previously-entered user selections. Playback software from a source website may be posted to a target website to allow access of the content item at the source website. | 2010-01-14 |
20100011426 | Subscriber-Specific Enforecement of Proxy-Mobile-IP (PMIP) Instead of Client-Mobile-IP (CMIP) - A method provides subscriber-specific activation of network-based mobility management using an authentication server. According to the method, network-based mobility management is enforced, even if the mobile terminal supports terminal-based mobility management. This gives a network provider complete control over mobility management in his network, preventing configuration problems during the configuration of mobile terminals. In the method, after the successful authentication of a subscriber, the authentication server transmits an authentication confirmation message to an authentication client in an access network. The received authentication confirmation message contains an activation attribute for activating network-based mobility management, if the authentication server does not provide a common mobile key for terminal-based mobility management. | 2010-01-14 |
20100011427 | Information Storage Device Having Auto-Lock Feature - An information storage device is protected from unauthorized access by requiring periodic re-authentication of user credentials. Failure to correctly re-authenticate within a time window results in the automatic locking of the portions of the storage device that have been previously enabled for the user so that they are no longer accessible. | 2010-01-14 |
20100011428 | SYSTEM, METHOD AND COMPUTER PROGRAM, FOR ENABLING ENTRY INTO TRANSACTIONS ON A REMOTE BASIS - A system, method and computer program for enabling transactions on a remote basis is provided. The method of the present invention comprises the steps of: (1) providing a first computer at a location of a customer, and providing a second computer at a location of a financial institution, the first computer and the second computer being linked so as to provide a two-way audiovisual communication system; (2) providing an authentication request at the second computer and communicating the request to the first computer; (3) the customer reviewing the request and providing a signature or other writing as an input to an input device connected to the first computer; (5) transmitting the signature from the first computer to the second computer; (6) receiving the signature and providing the signature to a plotting device connected to the second computer; and (7) applying the signature to a transactional document, wherein the audiovisual information received by the second computer and the signature received by the second computer in combination provide a means of transaction authentication and non-repudiation. | 2010-01-14 |
20100011429 | Secure on line accounts (SOLA) system using cell phones and other wireless devices - This invention describes a cell phone, or other wireless device (henceforth known as “device”), to transmit sound (audible and inaudible) alphanumeric code in any language, special characters or symbols or graphic or pictures or videos or any combination thereof, to an on-line account at a web server that is equipped with a compatible digital transceiver card and software driver and/or firmware for the operation, management and maintenance of this system. Upon verification of the transmitted code or sound, by the web server, access is granted. The said server then transmits a randomly selected new code of any combination of the codes or sounds stated above to the device for storage. The said transmission from the web server cannot be stored in any other device. The device has a menu item and/or numeric code for each on-line account of the user. | 2010-01-14 |
20100011430 | Computer architecture for managing courseware in a shared use operating environment - Methods, devices, and systems are provided in a multi-level computer architecture which provides improved capabilities for managing courseware and other content in a shared use operating environment such as a computer network. In particular, the invention provides a commercial networked instruction content delivery method and system which does not exclude synchronous sharing but is focused on asynchronous sharing. Security means in the architecture provide content property holders with the ability to know how many minutes of use an individual made of licensed material and with increased certainty that their material cannot be used, copied, or sold in usable form unless and until a user site is connected or reconnected to a minute-by-minute counter which is located off the premises of the user. This security link helps protect software and other works which are being sold or licensed to an individual, organization, or entity, and creates income opportunities for owners of such content. | 2010-01-14 |
20100011431 | METHODS AND APPARATUS FOR AUTHORIZING ACCESS TO DATA - In one embodiment, a method comprises receiving a request from a first party for access to controlled data, and providing access to the controlled data to a second party. The first party requests access to the controlled data and a token is provided to the first party. The token includes data associated with authorized access to the controlled data. A request for access to the controlled data including the token is later received from the second party, and access to the controlled data is provided to the second party. | 2010-01-14 |
20100011432 | AUTOMATICALLY DISTRIBUTED NETWORK PROTECTION - A network protection solution is provided by which security capabilities of a client machine are communicated to a network security gateway so that a variety of processes can be automatically and dynamically distributed between the gateway and the client machine in a way that achieves a target level of security for the client while consuming the least possible amount of resources on the gateway. For example, for a client that is compliant with specified health and/or corporate governance policies and which is known to have A/V capabilities that are deployed and operational, the network security gateway will not need to perform additional A/V scanning on incoming network traffic to the client which can thus save resources at the gateway and lower operating costs. | 2010-01-14 |
20100011433 | METHOD OF CONFIGURING A SECURITY GATEWAY AND SYSTEM THEREOF - There is provided a rule-set generator and a method of automated configuration of a security gateway. The method comprises setting-up an initial rule-set; obtaining log records of communication events corresponding to the initial rule-set so as to obtain a sufficient amount of log records; transforming the obtained log records into respective rules, wherein source, destination and service fields in each rule correspond to source, destination and service values in respective obtained log record, and the action in all rules is defined as “Accept”, thus giving rise to a transformation-based rule-set; and processing the transformation-based rule-set so as to generate an operable rule-set by processing the transformation-based rule-set. | 2010-01-14 |
20100011434 | APPARATUS AND METHOD FOR ASSOCIATING CATEGORIZATION INFORMATION WITH NETWORK TRAFFIC TO FACILITATE APPLICATION LEVEL PROCESSING - An apparatus is described that associates categorization information with network traffic to facilitate application level processing through processing of network traffic in accordance with provisioned rules and policies. The apparatus includes a plurality of microcode controlled state machines, wherein at least one microcode state machine processes at least one input data field using a hash function to generate a hash identifier. This embodiment further includes a distribution circuit that routes input data to the plurality of microcode controlled state machines, such that at least one individual microcode controlled state machine applies a rule to the input data to produce the at least one input data field, and to produce modification instructions based on the hash identifier. This embodiment further includes a first circuit that appends the hash identifier to the input data to produce modified input data based on the modification instructions, and that routes the modified input data in accordance with an output routing strategy. Advantageously, the apparatus provides an architectural framework well suited to a low cost, high speed, robust implementation of flexible, advanced network security and monitoring features and network traffic analysis. | 2010-01-14 |
20100011435 | Method and System for Providing Guaranteed File Transfer in Corporate Environment Behind Firewall - A method, system, and computer program for transferring a file or a a text message from a user to one or more recipients in a network. The method includes routing the data packet from the sending user to one or more recipients behind a firewall. The method includes segmenting a file into a series of file blocks. The method includes compressing and encrypting the file blocks. The method includes verifying the integrity of each file block. The method includes a self recovery process that comprises means for maintaining the current state of the transfer, means for resuming interrupted transfer automatically, and means for checkpoint restart. The method includes store and forward technique where the file is kept in the intermediate server and it is sent at a later time to the recipient. | 2010-01-14 |
20100011436 | Methods and Systems For Secure Communication Over A Public Network - A method and system are presented for providing communication between users over a communication network. A database is provided which comprises verified data relating to identity of a plurality of individuals. The database is accessible through the network. The verified data allows for authenticating the identity of the individuals. One or more levels of permitted communications between individuals in said database and the user are defined on the basis of said verification. | 2010-01-14 |
20100011437 | APPARATUS AND METHOD FOR STORING EVENT INFORMATION FOR AN HVAC SYSTEM - An apparatus for storing event information relating to operation of an HVAC system includes: (a) at least one memory controller coupled with the HVAC system for receiving the event information; and (b) at least one memory unit coupled with the at least one memory controller. A first memory unit of the at least one memory unit is configured for receiving first selected information of the event information for accessing by at least one of a first party and a second party. A second memory unit of the at least one memory unit is configured for receiving second selected information of the event information for accessing by the second party. | 2010-01-14 |
20100011438 | Role-Based Privilege Management - In one embodiment, a computer implemented method for role-based privilege management is provided. The computer implemented method receives a transformation request from a requester to form a received request, and identifies a target environment of the received request. The computer implemented method determines whether the target environment matches a predefined environment in a set of role-based privileges and, responsive to a determination that the target environment matches a predefined environment in the set of role-based privileges, maps the parameterized privileges from the set of role-based privileges to the target environment and performs the request. | 2010-01-14 |
20100011439 | INFORMATION PROCESSING APPARATUS, CONTROL METHOD THEREFOR, AND PROGRAM - The present invention enables improvement in user convenience while reducing security degradation. To accomplish this, an information processing apparatus includes a display unit that displays an operation screen; an acceptance unit that accepts input from a user; a display control unit that controls display so as not to change the operation screen to a predetermined state when a predetermined time elapses without accepting input from the user by the acceptance unit; and an acquisition unit that acquires biological information of the user, wherein the display control unit does not change the operation screen to the predetermined state even if the predetermined time elapses without accepting input from the user by the acceptance unit if, within the predetermined time, the acquisition unit acquires biological information of the last user from whom input was accepted by the acceptance unit before the predetermined time started to be counted. | 2010-01-14 |
20100011440 | Computer Security Intrusion Detection System For Remote, On-Demand Users - An intrusion detection system, and a related method and computer program product, for implementing intrusion detection in a remote, on-demand computing service environment in which one or more data processing hosts are made available to a remote on-demand user that does not have physical custody and control over the host(s). Intrusion detection entails monitoring resources defined by the on-demand user (or a third party security provider) for intrusion events that are also defined by the on-demand user (or security provider), and implementing responses according to event-action rules that are further defined by the on-demand user (or security provider). An intrusion detection system agent is associated with each of the data processing hosts, and is adapted to monitor the intrusion events and report intrusion activity. If there are plural intrusion detection system agents, they can be individually programmed to monitor and report on agent-specific sets of the intrusion events. An intrusion detection system controller is associated with one of the data processing hosts. It is adapted to manage and monitor the intrusion detection system agent(s), process agent reports of intrusion activity, and communicate intrusion-related information to the on-demand user (or security provider). The responses to intrusion events can be implemented by the intrusion detection system controller in combination with the intrusion detection system agents, or by any such entity alone. | 2010-01-14 |
20100011441 | SYSTEM FOR MALWARE NORMALIZATION AND DETECTION - Computer programs are preprocessed to produce normalized or standard versions to remove obfuscation that might prevent the detection of embedded malware through comparison with standard malware signatures. The normalization process can provide an unpacking of compressed or encrypted malware, a reordering of the malware into a standard form, and the detection and removal of semantically identified nonfunctional code added to disguise the malware. | 2010-01-14 |
20100011442 | DATA SECURITY DEVICE FOR PREVENTING THE SPREADING OF MALWARE - A method and system for preventing spreading of malware, including: automatically launching an anti-malware control mechanism after a data security device connects to a computing device and receives power from the computing device, determining availability of a data path in the data security device before allowing data to pass through the data path, and scanning the data that passes through the data path. | 2010-01-14 |
20100011443 | Method for preventing the spreading of malware via the use of a data security device - Embodiments of the present invention set forth methods for preventing the spreading of malware via the use of a data security device. Specifically, one embodiment of the present invention sets forth a method, which includes the steps of activating a malware scanning engine in the data security device after the data security device is attached to a computer and a mobile device but before data communication between the computer and the mobile device occurs; invoke malware scanning engine before permitting any data communication between the mobile device and the computer to occur. | 2010-01-14 |
20100011444 | Systems and Methods for Detecting A Security Breach in a Computer System - The present invention provides systems and methods for applying hard-real-time capabilities in software to software security. For example, the systems and methods of the present invention allow a programmer to attach a periodic integrity check to an application so that an attack on the application would need to succeed completely within a narrow and unpredictable time window in order to remain undetected. | 2010-01-14 |
20100011445 | TRANSMITTER, SIGNAL TRANSFER METHOD, DATA DISTRIBUTION SYSTEM AND METHOD OF SAME, DATA RECEIVER, DATA PROVIDER AND METHOD OF SAME, AND DATA TRANSFERER - To enable usage of content at a receiver which does not have a copying function even if copyright protection is provided. Model names of receivers not having a function enabling copying of content are held in an authentication processing circuit ( | 2010-01-14 |
20100011446 | VERIFICATION OF UN-TRUSTED CODE FOR CONSUMPTION ON AN INSECURE DEVICE - Disclosed is a code verification service that detects malformed data in an automated process and rejects submission and distribution if any malicious code is found. Once the submission is verified it may be packaged in container. The container may then be deployed to a mobile device, and the public key may be used to verify that the container authentic. The device can load trusted managed libraries needed to execute the application and a manager can ensure that only trusted libraries access native resources of the device. | 2010-01-14 |
20100011447 | SECURE FILE PROCESSING - Apparatus, systems, and methods may operate to receive requests to securely process files on an untrusted client. Additional activity may include transparently redirecting file management operations associated with applications running on the untrusted client to file content associated with the files, where the file content is located in a sandbox on the untrusted client, where the sandbox is inaccessible to the applications. A data store, shared across the applications, may be used to share information associated with the file content. Additional apparatus, systems, and methods are disclosed. | 2010-01-14 |
20100011448 | MAINTAINING CONTACT WITH A DOCUMENT STORAGE FILE OWNER - Systems and methods of the present invention allow a file owner to upload and store a file to a File Storage Area. The file owner may synchronize a periodic clock to a time-based approval period during which the file owner may grant permissions to access the file. A file owner interface may store contact information for the file owner, and ping the information, substituting alternate contact information as necessary, alerting the file owner of any failure of the contact information prior to expiration of the time-based approval period. After expiration of the time-based approval period, grant of file permissions may be automatically approved. | 2010-01-14 |
20100011449 | Chip Card Having A First User Function, Method For Selecting An Identifier, And Computer System - The invention relates to a chip card having a first user function ( | 2010-01-14 |
20100011450 | IMMUNODEFICIENT MICE TRANSGENIC FOR HLA CLASS I AND HLA CLASS II MOLECULES AND THEIR USES - The invention relates to mice which are genetically deprived of T, B lymphocytes and NK cells, deficient for murine MHC class I and/or MHC class II molecules, and transgenic for the expression of the HLA class I and/or HLA class II molecules, and to their use as recipient hosts for the transplantation of human haematopoietic precursors, to study the human adaptative immune system development and function in vivo. The invention relates also to the applications of this human/mouse chimera model to improve immunotherapy against pathogens, cancer and autoimmune diseases. | 2010-01-14 |
20100011451 | PHENOTYPIC AND GENOTYPIC DIFFERENCES OF MVA STRAINS - The present invention provides kits and methods to screen viral nucleic acids for a profile of genetic deletions and mutations, optionally in combination with one or more assays for viral replication and/or attenuation capacity. | 2010-01-14 |
20100011452 | CHIMERIC NON-HUMAN ANIMAL - The present invention relates to a method for producing a chimeric non-human animal expressing a desired protein, and a chimeric non-human animal or an offspring thereof expressing a desired protein. | 2010-01-14 |
20100011453 | MODEL FOR MUSCULAR DYSTROPHY AND CARDIOMYOPATHY - An isolated zebrafish genetic strain having a dystrophin mutant phenotype and fish models useful for screening or assaying agents having potential activity on muscular dystrophy or cardiomyopathy. | 2010-01-14 |
20100011454 | HUMAN ARTIFICIAL CHROMOSOME (HAC) VECTOR AND HUMAN CELL MEDICINE COMPRISING SAME - This invention relates to a human artificial chromosome (HAC) vector carrying a human chromosome-derived centromere, a subtelomere sequence, and a telomere sequence, to a human cell medicine or human cells comprising the HAC vector, to methods for preparing the HAC vector and human cells, and to methods for producing a therapeutic protein using the HAC vector. | 2010-01-14 |
20100011455 | STEM CELL GENE TARGETING - The invention provides a method for generating a transgenic eukaryotic cell population having a modified human Rosa26 locus, which method includes introducing a functional DNA sequence into the human Rosa26 locus of starting eukaryotic cells. Also provided are targeting vectors useful in the method, as well as a cell population and a transgenic non-human animal comprising a modified human Rosa26 locus. Finally, the invention provides an isolated DNA sequence corresponding to the human Rosa26 locus. | 2010-01-14 |
20100011456 | Nucleic Acids and Proteins and Methods for Making and Using Them - The invention provides polypeptides, including enzymes, structural proteins and binding proteins, polynucleotides encoding these polypeptides, and methods of making and using these polynucleotides and polypeptides. Polypeptides, including enzymes and antibodies, and nucleic acids of the invention can be used in industrial, experimental, food and feed processing, nutritional and pharmaceutical applications, e.g., for food and feed supplements, colorants, neutraceuticals, cosmetic and pharmaceutical needs. | 2010-01-14 |
20100011457 | SWEET PEPPER LINE SBR28-1244 - The invention provides seed and plants of the pepper line designated SBR28-1244. The invention thus relates to the plants, seeds and tissue cultures of pepper line SBR28-1244, and to methods for producing a pepper plant produced by crossing a plant of pepper line with itself or with another pepper plant, such as a plant of another line. The invention further relates to seeds and plants produced by such crossing. The invention further relates to parts of a plant of pepper line SBR28-1244, including the fruit and gametes of such plants. | 2010-01-14 |
20100011458 | SWEET PEPPER LINE SBR28-1220 - The invention provides seed and plants of the pepper line designated SBR28-1220. The invention thus relates to the plants, seeds and tissue cultures of pepper line SBR28-1220, and to methods for producing a pepper plant produced by crossing a plant of pepper line with itself or with another pepper plant, such as a plant of another line. The invention further relates to seeds and plants produced by such crossing. The invention further relates to parts of a plant of pepper line SBR28-1220, including the fruit and gametes of such plants. | 2010-01-14 |
20100011459 | HYBRID CORN PLANT AND SEED PPVO1864 - This invention provides hybrid maize plant designated PPVO1864. This invention further provides hybrid seed of PPVO1864, hybrid plants produced from such seed, and variants, mutants, and trivial modifications to hybrid PPVO1864, as well as methods of using the hybrid and products produced from the hybrid. | 2010-01-14 |
20100011460 | STEM-REGULATED, PLANT DEFENSE PROMOTER AND USES THEREOF IN TISSUE-SPECIFIC EXPRESSION IN MONOCOTS - The invention is directed to isolated promoters from stem-regulated, defense-inducible genes, such as JAS promoters. The promoters are useful in expression cassettes and expression vectors for the transformation of plants. Particularly, the invention provides transgenic plants of rice and sugarcane that have been modified such that expression of a heterologous coding sequence is directed by an JAS promoter and is limited to stem tissues or may be upregulated by the presence of a defense-inducing agent. The invention also discloses methods for producing the expression vectors and transgenic plants. | 2010-01-14 |
20100011461 | Nucleic acid molecules encoding enzymes having fructosyltransferase activity, and their use - Nucleic acid molecules are described which encode polypeptides having the enzymatic activity of a fructosyltransferase. Also, vectors, host cells and transgenic plants are described which contain such nucleic acid molecules. Furthermore, processes for producing polyfructose, particularly that of the inulin type, using the hosts described and/or the fructosyltransferase produced by them are described. | 2010-01-14 |
20100011462 | FLAVIN MONOOXYGENASES AND TRANSCRIPTION FACTORS INVOLVED IN GLUCOSINOLATE BIOSYNTHESIS - The invention provides methods and materials relating generally to plant derived flavin-containing monooxygenases (FMOs) capable of catalysing oxidation of a thio- to a sulphinyl-group during glucosinolate biosynthesis. It further relates to plant derived MYB factors capable of transcriptional regulation of biosynthetic genes. These have utility in the modification of glucosinolate biosynthesis. | 2010-01-14 |
20100011463 | Compositions and Methods Using RNA Interference for Control of Nematodes - The present invention concerns double stranded RNA compositions and transgenic plants capable of inhibiting expression of genes essential to establishing or maintaining nematode infestation in a plant, and methods associated therewith. Specifically, the invention relates to the use of RNA interference to inhibit expression of a target plant gene, which is a 50657480 gene or a homolog thereof, and relates to the generation of plants that have increased resistance to parasitic nematodes. | 2010-01-14 |
20100011464 | PLANTS HAVING ENHANCED YIELD-RELATED TRAITS AND A METHOD FOR MAKING THE SAME - The present invention relates generally to the field of molecular biology and concerns a method for enhancing various economically important yield-related traits in plants. More specifically, the present invention concerns a method for increasing seed yield in plants by increasing expression in a plant of a nucleic acid sequence encoding a Dwarf1 (DWF1) polypeptide. The present invention also concerns plants having increased expression of a nucleic acid sequence encoding a DWF1 polypeptide, which plants have increased seed yield relative to control plants. The invention also provides constructs useful in performing the methods of the invention. | 2010-01-14 |
20100011465 | Protein Kinase Stress-Related Polypeptides and Methods of Use in Plants - A transgenic plant transformed by a Protein Kinase Stress-Related Polypeptide (PKSRP) coding nucleic acid, wherein expression of the nucleic acid sequence in the plant results in increased tolerance to environmental stress as compared to a wild type variety of the plant. Also provided are agricultural products, including seeds, produced by the transgenic plants. Also provided are isolated PKSRPs, and isolated nucleic acid coding PKSRPs, and vectors and host cells containing the latter. | 2010-01-14 |