05th week of 2010 patent applcation highlights part 73 |
Patent application number | Title | Published |
20100031302 | STREAM DISTRIBUTION SYSTEM, STREAM RECEIVING DEVICE, AND STREAM REPRODUCTION METHOD - According to one embodiment, a stream distribution system includes a distribution server that distributes content via streaming through a network, and a stream receiving device that receives the content from the distribution server. The distribution server includes a data distributor that distributes stream data of the content in response to a transmission request from the stream receiving device together with low bit-rate specific reproduction data. The specific reproduction data is tagged with a timestamp equivalent to that of the stream data and generated from the stream data. The stream receiving device includes a reproducer that switches reproduction output between the stream data and the specific reproduction data received from the distribution server while establishing reproduction synchronization between the stream data and the specific reproduction data based on the timestamp. | 2010-02-04 |
20100031303 | Headend apparatus for data transmission over cable access network - The present invention relates to a server used to transmit Ethernet data signals from an Ethernet network to multiple cable TV network clients or receive Ethernet data signals from the multiple cable TV network clients, the server comprising multiple APs (access points), wherein the APs synchronously start a downlink transmission or an uplink transmission, and wherein during the downlink transmission the APs convert the Ethernet data signals into encoded and modulated RF signals and transmit the encoded and modulated RF signals to the multiple cable TV network clients, and during the uplink transmission the encoded and modulated RF signals from the cable TV network clients and convert the encoded and modulated RF signals into the Ethernet data signals. | 2010-02-04 |
20100031304 | Program Data Management Server, Identifier Allocation Device, Program Data Management Method and Computer Program - Recorded program images can be searched by free keywords related to the images. | 2010-02-04 |
20100031305 | ENHANCED FIBER NODES WITH CMTS CAPABILITY - Enhanced Cable Modem Termination System (CMTS) functionality, including programmable digital domain modulators and demodulators for dynamic channel assignment, is incorporated into Fiber Nodes (FNs) or mini Fiber Nodes (mFNs), yielding enhanced Fiber Nodes (eFNs). These eFns distribute CMTS functionality deep into Hybrid-Fiber-Coax Networks (HFCN) rather than centralizing the CMTS functions within a single location. Moving the cable modem terminations closer to the subscribers shortens the analog RF paths required to support cable modems. Communication of both subscriber data and CMTS control data is performed over Ethernet-compatible packet networks between the field-based CMTSs and an upstream facility (e.g., the Head End), which includes an Internet gateway. Packet data for multiple subscriber cable modems is easily compressed and merged over common network paths, reducing cabling plant complexity and increasing bandwidth utilization. This approach dramatically reduces the infrastructure cost per cable modem. Distributing CMTS functionality among multiple eFNs also reduces demands on already stretched resources at the Head End for space, power, and HVAC. For HFCN channels containing signals with modulation or encoding schemes that are unknown or best processed upstream, the invention also provides for tunneling their spectrum over the same packet network as used for the cable modem data. The channels to be tunneled are isolated using digital receivers, translated to baseband, their data framed, merged with cable modem subscriber data, and transmitted over the packet network. Upstream, the framed channel data is parsed and the original channel spectrum reconstructed to permit information recovery. | 2010-02-04 |
20100031306 | MEDIA SOURCE MONITORING AND PARENTAL AWARDS - A content processing device selectively queries at least one remote device in response to a message received from a user device. The message includes an instruction to modify information in at least one user data set stored on a remote device. Modifying information includes providing an award to one or more users associated with the one or more data sets. | 2010-02-04 |
20100031307 | VIDEO RECEIVING APPARATUS AND VIDEO RECEIVING METHOD - A video receiving apparatus includes, a detecting unit configured to detect an error occurrence position on which an error occurs when a video stream received from a video distribution apparatus is supplied to a video reproducing unit to reproduce a video, a determining unit configured to determine reproduction start time based on a positional relationship between the detection position obtained by the detecting unit and a predetermined synchronization code in the video stream; and a control unit configured to designate the reproduction start time determined by the determining unit and to request the video distribution apparatus to transmit the video stream. | 2010-02-04 |
20100031308 | SAFE AND SECURE PROGRAM EXECUTION FRAMEWORK - A system and method is provided here that can make sure that the instruction sets executing on a computer are certified and secure. The system and method further facilitates a generic way to intercept instruction loading process to inspect loaded code segment 1 | 2010-02-04 |
20100031309 | POLICY BASED CONTROL OF MESSAGE DELIVERY - A method of policy based message delivery in a message delivery system includes supplementing a subscriber handle with supplemental information pertaining to a subscriber of the message delivery system, where the message delivery system including a set of subscribers, receiving a message for delivery within the message delivery system, comparing a set of policies with the supplemental information based on information contained in the received message, matching the message to a subscriber of the set of subscribers based on the comparison, and dispatching the message to a matched subscriber based on the matching. | 2010-02-04 |
20100031310 | SYSTEM AND METHOD FOR ROAMING PROTECTED CONTENT BACKUP AND DISTRIBUTION - A method includes receiving content and a license to the content at a storage system, receiving a request from a user system for the storage system to send the content and license to the user system, and sending the content and license from the storage system to the user system. Another method includes requesting content and a license to the content, receiving the content and license at a user system, requesting from the user system that the content and license be sent to a storage system, and requesting from the user system that the storage system send the content item to a second user system. In one embodiment, code could be used to perform a method that includes requesting content and a license to the content from a content provider, storing the content and license at a user system and a storage system, and requesting that the storage system send the content to another user system. | 2010-02-04 |
20100031311 | Method of executing virtualized application able to run in virtualized environment - A method of executing a virtualized application able to run in a virtualized environment. The virtualized application includes application software and the virtualized environment. The application software includes a license monitor to search for a software license while monitoring an execution policy set by a software provider when software is installed or executed. The virtualized environment includes an environment monitor to monitor an execution environment provided to the application software by the virtualized environment. Therefore, it is possible to prevent software able to run in a virtualized environment from being freely copied without any limitations by the execution policy provided by the software provider. | 2010-02-04 |
20100031312 | METHOD FOR POLICY BASED AND GRANULAR APPROACH TO ROLE BASED ACCESS CONTROL - A method includes receiving input parameters comprising a user identifier, a sensitive command name, and a filename; setting a return code to a default of success; and checking for a global (ANYUSER) entry in a sensitivity database. If there is a global entry in the sensitivity database, the following are performed: comparing the received sensitive command name to a sensitive command in the global entry in the sensitivity database; if the received sensitive command name matches a sensitive command in the global entry, checking for an allow flag or not allow flag; if a not allow flag is found, setting the return code to failure. A check is made for a userID entry in the sensitivity database matching the received user identifier. If the user identifier matches the userID entry, a check is made for an allow flag or not allow flag. The return code is output. | 2010-02-04 |
20100031313 | RELAY DEVICE, AUTHENTICATION SERVER, AND AUTHENTICATION METHOD - A relay device includes a security information reception unit, a security information processing unit, and a security information transmission unit. The security information reception unit receives, from a terminal device, first security information containing a user ID and user authentication information of a user of the terminal device. The security information processing unit adds a relay device ID and relay device authentication information to the first security information to generate second security information. The security information transmission unit transmits the second security information to an authentication server. | 2010-02-04 |
20100031314 | DISTRIBUTED PICO-CELL MOBILITY - System (PAA-BSS) comprising a plurality of access points (AP), defining a pre authentication area (PAA), the system communicating a list of frequencies relating to the access points of the pre-authentication area (PAA) and information as to the relative position of the access points to the a mobile station seeking pre-authentication before the system. Method of preparing a mobile station for handover between access points, wherein the mobile station associating ( | 2010-02-04 |
20100031315 | Systems and methods for protecting against denial of service attacks - Systems and methods utilizing the network layer and/or application layer to provide security in distributed computing systems in order to thwart denial of service attacks. The systems and methods of the present invention utilize puzzles placed at the network layer level and/or application layer level to protect against denial of service attacks. Further, the systems and methods of the present invention advantageously provide a robust and flexible solution to support puzzle issuance at arbitrary points in the network, including end hosts, firewalls, and routers and thereby a defense against denial of service attacks. | 2010-02-04 |
20100031316 | SYSTEM ACCESS LOG MONITORING AND REPORTING SYSTEM - A user requests approval from an application server for accessing a program in a managed server. If the access is approved, the application server issues authentication information which includes at least a public key and a private key. The managed server receives command from the user to execute by the program. An original authentication value is computed from the command. The original authentication value is encrypted with the public key. The encrypted original authentication value is stored in association with the command in a log storage. Alteration of the command can be detected by computing a new authentication value from the stored command. The stored encrypted original authentication value is decrypted with the private key to obtain the original authentication value, which is compared with the new authentication value. An alarm is set if the comparison is not satisfied. | 2010-02-04 |
20100031317 | SECURE ACCESS - Secure access is provided to a resource hosted in a first domain. A first web server provides access to the resource. A second web server is provided in a second domain for receiving requests from a user for access to the resource. A browser is arranged for authentication and authorization for access to resources in the second domain and for forwarding requests from the user to the second web server. A reverse proxy is provided for publishing, with a resource identifier identifying the second domain, the resource to the second web server. The reverse proxy is arranged to forward to the first web server for access to the resource requests received from the second browser. | 2010-02-04 |
20100031318 | DISTRIBUTED DEVICE REVOCATION - In a distributed revocation method, it is individually decided at each of a plurality of autonomous device nodes of a distributed network whether a suspect autonomous device node or suspect distributed key of the distributed network should be removed from the distributed network. A voting session is conducted at which the individual decisions of the plurality of autonomous device nodes are combined to decide whether the suspect autonomous device node or suspect distributed key should be removed from the distributed network. The suspect autonomous device node or suspect distributed key is removed from the distributed network responsive to the voting session deciding in favor of removal. | 2010-02-04 |
20100031319 | Secure messaging using caller identification - A method of securing an electronic message from a sender to a recipient comprising the step of restricting access to content of message at a recipient terminal unless an session is opened by transmission of a signal from equipment of the recipient via a second communication channel. | 2010-02-04 |
20100031320 | USER INDICATOR SIGNIFYING A SECURE MODE - Computer-readable media, computerized methods, and computer systems for alerting a user that an operating system has entered a secure mode is provided. Initially, inputs are received at an operating system residing in a default mode. Typically, the default mode allows applications running on the operating system to access the inputs. If the inputs are identified as a call to perform a protected operation, the operating system is transitioned from the default mode to the secure mode. Typically, the secure mode restricts the applications from intercepting the inputs. The transition to the secure mode is automatically communicated to the user via an indicator device. Generally, automatic communication includes providing a message from the operating system to the indicator device over a secure pathway that triggers the indicator device to generate a user-perceivable output. Accordingly, the operating system exerts exclusive control over the operation of the indicator device. | 2010-02-04 |
20100031321 | Method and system for preventing impersonation of computer system user - A system and method for preventing an administrator impersonating a user from accessing sensitive resources on a target system is provided. The method comprises receiving a first request from a user to change the user's password on a target system to be changed, sending a “change password” request for the user to the target system, storing the user's new password, receiving a second request from the target system on behalf of the user for access to a sensitive resource, wherein the second request contains information about the user's password, and denying the second request if the information about the user's password is not consistent with the user's stored new password. | 2010-02-04 |
20100031322 | SECURE PRINTING METHOD - A method for secure printing comprising receiving a user print request to print information from a computer terminal, wherein the computer terminal is located in a network and is assigned an internet protocol address, prompting the user for approval to instruct a designated printer to commence printing the print request, wherein the designated printer is connected to a network and is assigned an internet protocol address, determining whether the computer terminal and the designated printer are in the same network by comparing the first portion of the computer terminal's internet protocol address with the first portion of the designated printer's internet protocol address, and instructing the designated printer to commence printing if the computer terminal and the designated printer are determined to be in the same network. | 2010-02-04 |
20100031323 | Network Interface Device - There are methods and apparatus, including computer program products, for defining a policy including a set of rules for a packet forwarding device by receiving information sufficient to enable a first rule related to one of security or traffic management to be defined, and based on the received information, enabling a corresponding second rule related to the other one of security or traffic management to be defined. | 2010-02-04 |
20100031324 | APPARATUS AND METHOD FOR DYNAMIC LICENSING ACCESS TO WIRELESS NETWORK INFORMATION - An apparatus and method for dynamically licensing access to wireless network information provides multiple third parties with selective access to network device information in real-time. Information is collected in real-time from a plurality of sensing and control devices configured in a network arrangement. Information may be collected from each of the sensing and control devices regardless of the communication protocol associated with the device. The collected information is stored and aggregated by a service broker, which selectively licenses access to the information, or subsets of the information, to one or more third parties. | 2010-02-04 |
20100031325 | SYSTEM FOR ENABLING MULTIPLE EXECUTION ENVIRONMENTS TO SHARE A DEVICE - According to the present invention, there is provided a data processing system comprising: a dedicated physical device for access by a single client only; a shared physical device for shared access by multiple clients; a partition of a first type associated with the dedicated physical device, the first type partition comprising said single client and a first device driver for accessing the dedicated physical device; a partition of a second type associated with the shared physical device, the second type partition comprising a second device driver for accessing the shared physical device, and a back end driver for accessing the second device driver; and multiple partitions of the third type each comprising a respective one of said multiple clients and a front end driver for accessing the shared physical device via the second type partition. There is also provided a method of operating the data processing system comprising: executing a user application in the standard domain; and executing in the trusted domain, one or more predetermined operations, services and/or functions relating to the user application. | 2010-02-04 |
20100031326 | SYSTEM AND METHOD FOR MANAGING SUPERIOR/SUBORDINATE INTERACTIONS - A system and method for automating the creation, optimization and deployment of multimedia, interactive, mentoring communication modules (“MIPs”) is provided. Simplified interfaces allow superiors to generate MIPs and asynchronously deploy them to subordinates' mobile devices or personal computers. The completed MIP are automatically coded for optimal performance on specific mobile operating systems to which they are deployed. Automatic notifications are sent to registered subordinates upon deployment of a completed MIP. User configurable and system updatable management portals and subordinate portals are automatically generated to provide a user interface to enable mentoring interactions between the superior and subordinates. The MIPs allow custom tailoring of educational and developmental exercises. Performance of the exercises can be monitored by a superior for each of a plurality of subordinates. | 2010-02-04 |
20100031327 | SAFETY JUDGMENT METHOD, SAFETY JUDGMENT SYSTEM, SAFETY JUDGMENT APPARATUS, FIRST AUTHENTICATION APPARATUS, AND COMPUTER PROGRAM PRODUCT - Security of an information processing apparatus is ensured by performing biological information authentication and collecting the environment information about the information processing apparatus. The information processing apparatus transmits the collected environment information to a first authentication apparatus. An electronic certificate issued by a second authentication apparatus and information encrypted with a secret key issued by the second authentication apparatus are transmitted to the first authentication apparatus. The first authentication apparatus acquires the public key of the second authentication apparatus and the public key of the information processing apparatus so as to decrypt the encrypted information, and judges whether or not the decrypted information is proper. The first authentication apparatus refers to an environment information database and the transmitted information, and judges whether or not the transmitted environment information is proper. When all the authentications by the biological information authentication, environment information authentication and electronic certificate authentication are successful, the information processing apparatus is judged to be safe. | 2010-02-04 |
20100031328 | SITE-SPECIFIC CREDENTIAL GENERATION USING INFORMATION CARDS - Systems and methods for generation of site-specific credentials using information cards are provided. An apparatus can include a machine, a browser on the machine configured to receive a request from a relying party site for a credential from a user, a receiver to receive one or more inputs, a site-specific credential generator to generate the credential based on the inputs, and a transmitter configured to transmit the generated credential to the relying party site. | 2010-02-04 |
20100031329 | METHOD TO AUTHENTICATE DEVICE AND SERVICE, AND SYSTEM THEREOF - A method to authenticate a device and service, and a system thereof, the authentication method including: requesting device authentication information from a device provider in order to receive a service from a service provider, distinct from the device provider, and receiving the device authentication information from the device provider, the device authentication information being used by the service provider to authenticate the device. Therefore, it is possible to perform a device authentication process and service authentication process more simply. | 2010-02-04 |
20100031330 | METHODS AND APPARATUSES FOR CONTROLLING ACCESS TO COMPUTER SYSTEMS AND FOR ANNOTATING MEDIA FILES - Methods and apparatuses for controlling access to computer systems and for annotating media files. One embodiment includes a method including generating a challenge to a user, wherein the challenge includes a verify part and a read part. The methods also includes prompting the user to solve both the verify part of the challenge and the read part of the challenge; receiving input from the user; determining if the input from the user relative to the verify part of the challenge corresponds with the known answer for the verify part of the challenge; and identifying the input from the user relative to the read part of the challenge as an answer to the read part of the challenge, if the input from the user relative to the verify part of the challenge corresponds with the known answer for the verify part of the challenge. | 2010-02-04 |
20100031331 | Remote Access Method - All operations available on an intranet are securely performed from an outside of the intranet without taking out a file on the intranet from the intranet. A file on the intranet is not taken out, but, instead of this, image information on a target computer | 2010-02-04 |
20100031332 | SECURE ACCESS - Secure access to a resource is provided by receiving a user request associated with a username for access for a resource and checking the username associated with the request against a reference username associated with the user. The reference username is linked to a second username associated with the user. If the received username matches the reference username, the request is modified by replacing the received username with the second username, and the modified request is forwarded towards the resource. A new username can be recorded upon receiving a request for the user. In response to the received request, the new username is recorded at a reference location linked to the location of the second username. | 2010-02-04 |
20100031333 | SECURE EMAIL - Methods of paying debt over a network and debtor computer systems are provided for forming a secure email link between the debtor computer system and a creditor computer system; transmitting a notice of debt from the creditor computer system to the debtor computer system using the secure email link; and paying at least a portion of the debt at the debtor computer system based upon the notice of debt. The secure email link may be formed over a peer-to-peer email system. | 2010-02-04 |
20100031334 | SECURE ACCESS - A system and method for controlling access to a protected network resource is provided. Access is controlled as follows. User credentials received with a request from a user for access to the protected network resource are checked against predetermined user information so as to authenticate the user; The request is made via a network access point located within a restricted area. The recorded location of the user is checked to determine whether the user is recorded as being within the restricted area. Access to the protected network resource is allowed if the user credentials are authenticated and the user is recorded as being within the restricted area. The user's network connection is monitored and, on detection that the user is disconnected from the network, the user is recorded as not located within the restricted area. Additional credentials are required from the user to support the user's request when the user is not recorded as being within the restricted area. | 2010-02-04 |
20100031335 | REMOTE PROFILE SECURITY SYSTEM - A method comprises storing, at the server computer system, user profile information for the remote user. The user profile information for the remote user (or a link to the user profile information) is encrypted using authentication information. The user profile information is associated with user identification information, at the server computer system, using the authentication information, which is selectively made available by the remote user via the network to the server computer system in order to enable the server computer system to associate the user profile information with the user identification information. | 2010-02-04 |
20100031336 | Peripheral Security Device - A peripheral security device is capable of being physically connected to a host terminal, on which is installed at least one software drive that is capable of permitting communication between said host terminal and a peripheral device with a human interface. This peripheral security device comprises a microprocessor capable of sending security data to the terminal during communication with the terminal. It is characterized in that the communication between the peripheral security device and the host terminal is managed at the level of the terminal via the software driver and simulates a communication between the peripheral device with a human interface and the host terminal. | 2010-02-04 |
20100031337 | METHODS AND SYSTEMS FOR DISTRIBUTED SECURITY PROCESSING - Methods and systems for processing information that is secured in transit between communicating computers utilizing a security protocol. In accordance with one embodiment of the present invention, processing with respect to the security protocol is performed by an intermediate network device located remotely from a secure data center, while maintaining the security of persistent credentials such as passwords and private cryptographic keys. The invention may be employed in conjunction with beneficial networking functions such as acceleration, traffic management and monitoring, content filtering, and the like, allowing such functions to be performed on secured traffic. The invention allows the remotely located network device to perform security protocol processing on behalf of a computer without having direct access to the persistent credentials of that computer, thereby improving overall system security. | 2010-02-04 |
20100031338 | Collaboration gateway - Method for exchanging information between heterogeneous secured networks. Method supports synchronous communications across security domains including text chat, instant messaging, audio applications, video applications, and whiteboard collaboration. The invention intercepts incoming information traffic on either side and employs a guard for filtering information traffic between security domains according to a policy engine. | 2010-02-04 |
20100031339 | Streaming Media Service For Mobile Telephones - A mobile client ( | 2010-02-04 |
20100031340 | NETWORK SECURITY MODULE FOR ETHERNET-RECEIVING INDUSTRIAL CONTROL DEVICES - A high-speed security device for network connected industrial controls provides hybrid processing in tandem hardware and software security components. The software security component establishes state-less data identifying each packet that requires high-speed processing and loads a data table in the hardware component. The hardware component may then allow packets matching data of the data table to bypass the software component while passing other non-matching packets to the software component for more sophisticated state analysis. | 2010-02-04 |
20100031341 | SYSTEMS AND METHODS FOR SECURE COMMUNICATION OVER A WIRELESS NETWORK - A method of secure communication between a wireless device and a target network is presented, comprising receiving a communication addressed to a target network, the communication comprising a data payload and originating from a wireless device on a trusted wireless network, establishing a secure channel with the target network and sending the communication to the target network over the secure channel. The method can further comprise negotiating secure channel parameters with the target network, encrypting the data payload, adding data integrity protection to the communication, encapsulating the communication according to a VPN protocol, authenticating the wireless device as an authorized user of the private network and granting access to a target network resource. | 2010-02-04 |
20100031342 | Method and system for providing secure video data transmission and processing - A system and method for secure graphics processing employing an operating system that supports multiple independent levels of security (MILS) is described. A video queuing mechanism is provided in conjunction with a cross domain guard to receive extended graphics language video inputs from multiple input applications in multiple security enclaves. Without accessing sensitive data, a function manages desired format and mode selections of the displays, coordinates the execution of multiple graphics applications that produce the needed video content, as well as communicate with a one or more high assurance render functions regarding how to draw each video output's content in a secure and easily certifiable manner. | 2010-02-04 |
20100031343 | USER POLICY MANAGEABLE STRENGTH-BASED PASSWORD AGING - Password aging based on the strength of the password provides an incentive for users to generate and/or memorize more complex passwords. The strength of the password is computed from a formula that relates the length of the password and the types of characters contained in the password to a strength value, which can be performed using a lookup table having values for different characteristics of the password, determining partial strength values corresponding to the ranges in which the characteristics fall, and then adding the partial strength values. Alternatively, a separate password strength application may be used to provide the strength value, which is entered by the user or administrator generating a new password. Alternatively, the password may be generated based on a specified desired expiration period, with the strength computation performed to ensure that the strength is sufficient to merit the desired expiration period. | 2010-02-04 |
20100031344 | TOUCH-SCREEN BASED PASSWORD INPUT SYSTEM AND ELECTRONIC DEVICE HAVING SAME - An electronic device includes multi-touch screen and a password input system. The multi-touch screen can detect a sequence of user inputs, each of which involves tapping at least one point thereof. The password input system includes a determining unit, a storing unit, an indexing unit, and an outputting unit. The determining unit can count the numbers of touch point(s) of the user inputs. The storing unit stores a character database which includes a collection of numbers of touch point(s) and a collection of corresponding machine-readable characters. The indexing unit can look up matching machine-readable characters for the user inputs in the character database. The outputting unit can output the matching machine-readable characters sequentially as a password. | 2010-02-04 |
20100031345 | Access to a processing device - Authorizing access to one or more restricted functions provided by a processing device is described. A method for authorizing such access comprises: reading at least one time from a clock associated with the processing device; storing the read time as a reference time; after the read time is stored, reading another time (a current time) from the clock. The method also includes comparing the reference time with the current time; reading a trend status associated with the reference time; and authorizing access to the restricted functions provided by the processing device if an acceptance criterion is satisfied. The acceptance criterion may require (i) the read current time to be chronologically earlier than the reference time and the trend status to be trusted backward mode, or (ii) the read current time to be chronologically later than the reference time. | 2010-02-04 |
20100031346 | AUTHENTICATION APPARATUS, AUTHENTICATION SYSTEM, AUTHENTICATION METHOD, AND RECORDING MEDIUM HAVING AUTHENTICATION PROGRAM RECORDED THEREON - It is determined whether a login button is pressed or not. If the login button being pressed is sensed, a user authentication window appears. After the user authentication window appears, it is determined whether an authentication code is input or not. If an authentication code is input, then it is determined whether a prescribed period of time has passed or not since the last logout. If it is determined that a prescribed period of time has not passed since the last logout, authentication is performed in MFP. It is then determined whether the authentication is “OK” or not. If the authentication is “OK,” the authentication is successful. A login process is then executed. | 2010-02-04 |
20100031347 | REPRODUCING APPARATUS, SYSTEM LSI, AND INITIALIZATION METHOD - Hardware of a playback apparatus | 2010-02-04 |
20100031348 | LOCKED-DOWN COMPUTING ENVIRONMENT - Some embodiments of the present invention provide a system that presents an alternate computing environment on a host computing device. During operation, this system detects the presence of a removable storage device which is in communication with an interface of the host computing device. The system also locates code which implements the alternate computing environment on the removable storage device. Finally, the system runs the code which presents the alternate computing environment through an environment player on the host device, wherein the environment player prevents a user of the alternate computing environment from interacting directly with a native computing environment of the host computing device. | 2010-02-04 |
20100031349 | Method and Apparatus for Secure Data Storage System - A secure storage system includes a storage device having a communication device and a memory. The communication device is for polling a communication medium. A security token is received from the communication medium via the communication device of the storage device. The security token received from the communication medium is compared to a second security token stored on the storage device. In one embodiment, a current location of the storage device is determined. The current location of the storage device is compared to an approved security zone. Access to the memory is provided if the security token received from the communication medium matches the second security token stored on the storage device and the current location of the storage device lies within the approved security zone. A time-out counter is set to a non-zero value after access to the memory is provided. | 2010-02-04 |
20100031350 | IC CARD AUTHENTICATION APPARATUS, IC CARD AUTHENTICATION METHOD, AND RECORDING MEDIUM HAVING IC CARD AUTHENTICATION PROGRAM RECORDED THEREON - An IC card is recognized by an IC card reader. Data is obtained from the recognized IC card. Card ID included in the obtained data is compared with card ID stored in a user registration information DB. If it is determined that the same card ID exists, an IC card issue count included in the obtained data is compared with an IC card issue count stored in the user registration information DB, and it is determined whether the counts are the same. If it is determined that the issue counts are not the same, a PIN code entry window appears so that the entered PIN code is compared with a PIN code in the user registration information DB. If it is determined that the PIN codes are the same, authentication success is displayed. | 2010-02-04 |
20100031351 | Security-activated production device - Methods and systems for a security-activated production device include but are not limited to obtaining access to an object data file configured to produce one or more objects on the production device; verifying an authorization code associated with the object data file; and controlling operation of the production device to enable or prevent production of the one or more objects pursuant to the authorization code in accordance with one or more predetermined conditions. | 2010-02-04 |
20100031352 | System and Method for Enforcing Licenses During Push Install of Software to Target Computers in a Networked Computer Environment - Systems, methods, and computer-readable media for enforcing licenses during the push install of a software package in a networked environment via parsed serial numbers. | 2010-02-04 |
20100031353 | Malware Detection Using Code Analysis and Behavior Monitoring - Aspects of the subject matter described herein relate to malware detection using code analysis and behavior monitoring. In aspects, an anti-malware engine performs static analysis on program code and monitors behavior of the program code that is exhibited when the program code executes in a virtual and/or non-virtual environment. The anti-malware engine combines the results of both types of malware detection to determine whether the program code includes malware. The anti-malware engine may use feedback from one or more of the malware detection mechanism to direct additional malware detection (e.g., static and/or behavior detection) for the program code. | 2010-02-04 |
20100031354 | Distributive Security Investigation - A security investigation system uses a central server to distribute requests for security information regarding an asset, receive responses, and manage the information in the responses in a case object. Requests may be distributed to various servers, each of which may have an agent that may receive the request, search various databases, logs, and other locations, and generate a response. A case object may be continually updated in some embodiments. The case object may be viewed, analyzed, and other requests generated using automated or manual tools. A case object may be sanitized for analysis without compromising sensitive information. | 2010-02-04 |
20100031355 | UNVALIDATED PRIVILEGE CAP - A method for securely accessing an executable file object includes a step in which a request from the target process to access the executable file object is received by an operating system component, and the object is examined for validity before access is allowed. For objects that cannot be validated, the process is run with privileges bounded by the privilege cap, if the privilege cap permits execution of the object. | 2010-02-04 |
20100031356 | BINDING UPDATE METHOD IN MIPv6 - A binding update method in MIPv6 is provided which includes: a first step of allowing a mobile node to generate a HoTI (Home Test Init) message including a HoA (Home Address) encoded with a product of a first prime number and a second prime number and to transmit the HoTI message to a corresponding node through a home agent along with a first index; a second step of allowing the mobile node to generate a CoTI (Care of Test Init) message including a CoA (Care-of Address) encoded with a product of the first prime number and a third prime number and to transmit the CoTI message directly to the corresponding node along with a second index; a third step of allowing the corresponding node to generate a HoT (Home of Test) message including a first nonce and to transmit the HoT message to the mobile node through the home agent; a fourth step of allowing the corresponding node to generate a CoT (Care-of Test) message including a second nonce and to transmit the CoT message to the mobile node; a fifth step of allowing the mobile node to generate a BU (Binding Update) message by adding the first prime number to the first nonce and the second nonce included in the HoT message and the CoT message and to transmit the BU message to the corresponding node; and a sixth step of allowing the corresponding node to verify the BU message using an exclusive OR operation and a factorization operation in prime numbers with the first prime number and to transmit a BA (Binding Ack) message to the mobile node. | 2010-02-04 |
20100031357 | Defending Smart Cards Against Attacks by Redundant Processing - A method is provided which defends a computer program against attacks independently of the complexity of the program. A request to invoke the application is received. A process execution state is set to indicate a first execution. The application is executed in response to the request, and application data and control information calculated by the application is stored while the application is executed. The process execution state is set to indicate a subsequent execution. At least part of the application is executed for at least one subsequent time. Application data and control information calculated by the application during subsequent executions is compared with the data/information stored during first execution. The comparison is done by operation system services which are responsive to the process execution state. When the comparison shows a discrepancy in the compared application data and control information, appropriate error handling takes place. | 2010-02-04 |
20100031358 | SYSTEM THAT PROVIDES EARLY DETECTION, ALERT, AND RESPONSE TO ELECTRONIC THREATS - The invention is a computer system that provides early detection alert and response to electronic threats (eThreats) in large wide area networks, e.g. the network of an Internet Services Provider or a Network Services Provider. The system of the invention accomplishes this by harnessing the processing power of dedicated hardware, software residing in specialized servers, distributed personal computers connected to the network, and the human brain to provide multi-layered early detection, alarm and response. The layers comprise: a Protection Layer, which detects and eliminates from the network data stream eThreats known to the system; a Detection Layer, which detects and creates signatures for new eThreats that are unknown to the system; an Expert Analysis Layer, which comprises a group of human experts who receive information from various components of the system and analyze the information to confirm the identity of new eThreats; and a Collaborative Detection & Protection Layer, which detects potential new eThreats by processing information received from various system agents and users. A Dynamic Sandbox Protection Layer associated with the distributed personal computers connected to the network. can optionally be part of the system of the invention. | 2010-02-04 |
20100031359 | PROBABILISTIC SHELLCODE DETECTION - Various embodiments include a method of detecting shell code in an arbitrary file comprising determining where one or more candidate areas exist within an arbitrary file, searching at least one nearby area surrounding each of the one or more candidate areas within the arbitrary file for an instruction candidate, and calculating for any such instruction candidate a statistical probability based on a disassembly of instructions starting at a found offset for the instruction candidate that the disassembled instructions are shellcode. | 2010-02-04 |
20100031360 | Systems and methods for preventing unauthorized modification of an operating system - Systems and methods are provided for preventing unauthorized modification of an operating system. The system includes an operating system comprised of kernel code for controlling access to operation of a processing unit. The system further includes an enforcement agent executing at a higher privilege than the kernel code such that any changes to the kernel code are approved by the enforcement agent prior to execution. | 2010-02-04 |
20100031361 | Fixing Computer Files Infected by Virus and Other Malware - The disclosed invention is a new method and apparatus for detecting and removing virus from a computing device based on a web or network service. Virus is detected by transmitting the attributes and behavior of application modules on a computing device to another computing device via a web service, where it is analyzed. After the item has been classified, that information is sent back to the computing device along with the instructions on how the remove the virus. Along with the instructions on virus remediation a clean copy of the file or a network location of the clean copy can be sent. | 2010-02-04 |
20100031362 | SYSTEM AND METHOD FOR IDENTIFICATION AND BLOCKING OF MALICIOUS USE OF SERVERS - A system and method to protect web applications from malicious attacks and, in particular, a system and method for identification and blocking of malicious DNS servers. The system includes a central processing unit and first program instructions. The first program instructions identify a rogue Domain Name Service (DNS) by identifying that a DNS metric is outside a historical limit. The first program instructions are stored on the computer system for execution by the central processing unit. | 2010-02-04 |
20100031363 | METHOD AND SYSTEM FOR USER DEFINED LOCAL STORAGE OF INFORMATION AND OBJECTS IN A VIRTUAL WORLD - The invention provides a method and system for securing information for a virtual world environment. The method includes creating information for a virtual world environment, transmitting the information to the virtual world environment from the memory, selectively removing the information from the virtual world environment, and selectively storing the information on a memory external to the server to prevent access from the server. | 2010-02-04 |
20100031364 | METHOD FOR CREATING A VERIFIABLE MEDIA OBJECT, A CORRESPONDING SYSTEM THEREOF, AND A VERIFICATION PACKAGE FOR A MEDIA OBJECT - In a first aspect, there is provided a method for creating a verifiable media object using a handheld device that includes a plurality of sensors. In a second aspect, there is provided a system for creating a verifiable media object using a handheld device that includes a plurality of sensors. Finally, in a third aspect, there is provided a verification package for a media object. | 2010-02-04 |
20100031365 | Method and apparatus for providing network access privacy - A method for providing network access privacy by classifying filter parameters of a group of users who are accessing one or more network destinations. The system includes a means for collecting information from both users, and about network destinations, generating suggestions for a user regarding filter parameters, and filtering network communications of users going to network destinations. In operation, users who are accessing network destinations are prompted to choose from a selection of filter parameters. The information provided by these users is then analyzed and used to generate suggested filter parameters for other users. As users provide more information to the system about various network destinations the system is able to provide more information to users about more network destinations and thus generate more accurate filter parameter suggestions. After a user selects their filter parameters the system filters a range of information coming from the user and going out to the network destination. | 2010-02-04 |
20100031366 | Method of Providing Digital Rights Management for Music Content by Means of a Flat-Rate Subscription - The invention enables digital music content to be downloaded to and used on a portable wireless computing device. An application running on the wireless device has been automatically adapted to parameters associated with the wireless device without end-user input (e.g. the application has been configured in dependence on the device OS and firmware, related bugs, screen size, pixel number, security models, connection handling, memory etc. This application enables an end-user to browse and search music content on a remote server using a wireless network; to download music content from that remote server using the wireless network and to playback and manage that downloaded music content. The application also includes a digital rights management system that enables unlimited legal downloads of different music tracks to the device and also enables any of those tracks stored on the device to be played so long as a subscription service has not terminated. | 2010-02-04 |
20100031367 | Single File Rich Media Package Portable Across Multiple Devices - A process, format, and computer software for collecting a broad range of digital media objects, and storing them in a single, rich media container file, for simplified distribution and integrated playback. The resulting file can take on the dynamics of its intended use, so the music-oriented file may be album-centric, track oriented, and contain integrated cover art and links to the artist website, while a movie-oriented file may be video-centric, scene oriented, and contain integrated promotional art and links to actor biographies and photographs. Regardless of the usage, the resulting file provides an end user with an integrated, rich media viewing and listening experience, all in one place, and portable across multiple computers, mobile devices, and other platforms. The process and computer program for creating the rich media file also embeds digital rights management of the underlying content, and can enable both the publishers and users of the rich media file to customize their respective files with additional or unique content. | 2010-02-04 |
20100031368 | TAMPER DETECTION METHOD AND DATA STORAGE DEVICE USING THE SAME - A tamper detection method and a data storage device using the same are provided. The tamper detection method includes sensing a value of pressure applied to a data storage device using a pressure sensor, comparing the sensed pressure value with an initial pressure value sensed at an initial operation time of the data storage device, and detecting malicious tamper by comparing a threshold pressure value varying with the number of loads applied to the data storage device when the sensed pressure value is smaller than the initial pressure value. | 2010-02-04 |
20100031369 | SECURE DISTRIBUTED ITEM-LEVEL DISCOVERY SERVICE USING SECRET SHARING - A method and a system for a secure distributed item-level discovery service using secret sharing. The discovery service publishes a plurality of uniform resource locators that correspond to a resource identification key on a plurality of servers in a P2P ring. A uniform resource locator (URL) is split in a plurality of shares applying a secret sharing algorithm. For each share of the URL is generated share identifier by applying a hash function to the resource identification key. A share identifier is sent to a target node through a first proxy node applying Peer-to-Peer (P2P) routing. A share of the URL, corresponding to the share identifier is sent to the target node through a second proxy using a network address of the target node. Access rights for reading the share of the URL from the target node are published in an access control node. | 2010-02-04 |
20100031370 | SOFTWARE ENHANCED TRUSTED PLATFORM MODULE - Computer-executable instructions can implement a software-based Trusted Platform Module (TPM) that can have more computational power than the hardware TPM. The software TPM can be protected from modification, or other unauthorized access, via a memory partitioning scheme that enables other computer-executable instructions to access the software TPM in a predefined manner, but yet prohibits other access. A tri-partied partitioning scheme can be used wherein the computer executable instructions of the software TPM reside in a first region, a jump table to appropriate ones of those instructions resides in a second region, and everything else resides in the third region. The storage key of the software TPM can be sealed by the hardware TPM to be released only if the software TPM, and the computing device, are in a known good state, as determined by the Platform Configuration Registers of the hardware TPM, thereby further protecting the software TPM from tampering. | 2010-02-04 |
20100031371 | System and Method for Handling Peripheral Connections to Mobile Devices - Systems and methods for establishing a data connection between a mobile device and a peripheral. The mobile device is configured to determine whether to handle user approval of the data connection between the mobile device and the peripheral. Through the mobile device, an input mechanism is provided for the user to provide input. The input is used in determining whether to approve the data connection between the mobile device and the peripheral. | 2010-02-04 |
20100031372 | METHOD AND SYSTEM FOR SECURE FLEXIBLE SOFTWARE LICENSING - When executing a licensing management application, data indicative of licensing privileges of a software application for simultaneous execution on a subset of a plurality of computers are received from a licensor of the software application. The data indicative of licensing privileges comprise data indicative of a licensing key. For each of a plurality of users a peripheral licensing device is provided and the data indicative of a licensing key are then stored in memory thereof. Data indicative of a total number of users—equal to a number of the subset—are determined and provided to the licensor, or storage of the licensing key is prevented, when the total number is greater than a predetermined number of the subset. After execution of the licensing management application and provision of each of the users with a respective peripheral licensing device, each of the users is enabled to execute the software application by interfacing the peripheral licensing device with one of the computers, after which the data indicative of a licensing key are retrieved and the software application is executed. | 2010-02-04 |
20100031373 | METHOD AND SYSTEM FOR SECURE FLEXIBLE SOFTWARE LICENSING - When executing a licensing management application, data indicative of licensing privileges of a software application for simultaneous execution on a subset of a plurality of computers are received from a licensor of the software application. The data indicative of licensing privileges comprise data indicative of a licensing key. For each of a plurality of users a peripheral licensing device is provided and the data indicative of a licensing key are then stored in memory thereof. Data indicative of a total number of users—equal to a number of the subset—are determined and provided to the licensor, or storage of the licensing key is prevented, when the total number is greater than a predetermined number of the subset. After execution of the licensing management application and provision of each of the users with a respective peripheral licensing device, each of the users is enabled to execute the software application by interfacing the peripheral licensing device with one of the computers, after which the data indicative of a licensing key are retrieved and the software application is executed. | 2010-02-04 |
20100031374 | Security-activated operational components - Various methods and systems include exemplary implementations for a security-activated operational component. Possible embodiments include but are not limited to obtaining access to an object data file configured to implement various functional operation regarding one or more objects; verifying validity of an authorization code associated with the object data file; and controlling operation of the operational component to enable or prevent its activation pursuant to the authorization code in accordance with one or more predetermined conditions. | 2010-02-04 |
20100031375 | Signal Quality Monitoring to Defeat Microchip Exploitation - Method and apparatus and associated method of detecting microchip tampering may include a conductive element in electrical communication with multiple sensors for verifying that signal degradation occurs at an expected region of the conductive element. A detected variance from the expected region may automatically trigger an action for impeding an integrated circuit exploitation process. | 2010-02-04 |
20100031376 | Continuity Check Monitoring for Microchip Exploitation Detection - Apparatus, method and program product detect an attempt to tamper with a microchip by determining that an electrical path comprising one or more connections and a metal plate attached to the backside of a microchip has become disconnected or otherwise altered. A tampering attempt may also be detected in response to the presence of an electrical path that should not be present, as may result from the microchip being incorrectly reconstituted. Actual and/or deceptive paths may be automatically selected and monitored to further confound a reverse engineering attempt. | 2010-02-04 |
20100031377 | Prevention and treatment of synucleinopathic and amyloidogenic disease - The invention provides improved agents and methods for treatment of diseases associated with synucleinopathic diseases, including Lewy bodies of alpha-synuclein in the brain of a patient. Such methods entail administering agents that induce a beneficial immunogenic response against the Lewy body. The methods are particularly useful for prophylactic and therapeutic treatment of Parkinson's disease. | 2010-02-04 |
20100031378 | Novel gene disruptions, compositions and methods relating thereto - The present invention relates to transgenic animals, as well as compositions and methods relating to the characterization of gene function. Specifically, the present invention provides transgenic mice comprising disruptions in PRO227, PRO233, PRO238, PRO1328, PRO4342, PRO7423, PRO10096, PRO21384, PRO353 or PRO1885 genes. Such in vivo studies and characterizations may provide valuable identification and discovery of therapeutics and/or treatments useful in the prevention, amelioration or correction of diseases or dysfunctions associated with gene disruptions such as neurological disorders; cardiovascular, endothelial or angiogenic disorders; eye abnormalities; immunological disorders; oncological disorders; bone metabolic abnormalities or disorders; lipid metabolic disorders; or developmental abnormalities. | 2010-02-04 |
20100031379 | NON-HUMAN ANIMAL FOR EYE DISEASE MODEL - It is intended to provide an animal model which shows a naturally occurring eye disease symptom, particularly ocular hypertension and/or retinal degeneration. The invention relates to a non-human animal for eye disease model in which the function of Vav2 gene and/or Vav3 gene have/has been impaired. Because the animal shows a naturally occurring eye disease symptom, such as ocular hypertension and/or retinal degeneration without administering a drug or placing it in a special growth environment, it can be used as a model useful for elucidation of onset mechanism of eye disease or evaluation for therapeutic agent for eye disease. When it is applied for such a purpose, because it is not affected by an exogenous factor, which is conventionally administered for artificially inducing eye disease, it reflects a natural pathology, therefore, the clinical and industrial usefulness thereof is high. | 2010-02-04 |
20100031380 | IDENTIFICATION OF CHILLING-RESISTANT PLANTS - A process for identifying whether plant is resistant to chilling comprises cultivating the plant at a reduced temperature for a time period selected from short term and medium term; harvesting a tissue sample of the plant; measuring concentration of at least one metabolite in the tissue sample of the plant; comparing the measured concentration with the concentration of the same metabolite in a tissue sample harvested from a reference plant or a plant of the same species after cultivation at a reference temperature; and optionally, repeating the process of foregoing steps but cultivating the plant at a reduced temperature for a time period selected from short term and medium term and not previously used; wherein resistance to chilling is indicated by one or more of the effects on metabolites listed in Table 2 or Table 4. | 2010-02-04 |
20100031381 | SPINACH LINE SMB66-1086M - The invention provides seed and plants of the spinach line designated SMB66-1086M. The invention thus relates to the plants, seeds and tissue cultures of spinach line SMB66-1086M, and to methods for producing a spinach plant produced by crossing a plant of spinach line SMB66-1086M with itself or with another spinach plant, such as a plant of another line. The invention further relates to seeds and plants produced by such crossing. The invention further relates to parts of a plant of spinach line SMB66-1086M, including the fruit and gametes of such plants. | 2010-02-04 |
20100031382 | SPINACH LINE SSB66-1087F - The invention provides seed and plants of the spinach line designated SSB66-1087F. The invention thus relates to the plants, seeds and tissue cultures of spinach line SSB66-1087F, and to methods for producing a spinach plant produced by crossing a plant of spinach line SSB66-1087F with itself or with another spinach plant, such as a plant of another line. The invention further relates to seeds and plants produced by such crossing. The invention further relates to parts of a plant of spinach line SSB66-1087F, including the fruit and gametes of such plants. | 2010-02-04 |
20100031383 | SPINACH LINE SSB66-1092M - The invention provides seed and plants of the spinach line designated SSB66-1092M. The invention thus relates to the plants, seeds and tissue cultures of spinach line SSB66-1092M, and to methods for producing a spinach plant produced by crossing a plant of spinach line SSB66-1092M with itself or with another spinach plant, such as a plant of another line. The invention further relates to seeds and plants produced by such crossing. The invention further relates to parts of a plant of spinach line SSB66-1092M, including the fruit and gametes of such plants. | 2010-02-04 |
20100031384 | SPINACH LINE SMB66-1114F - The invention provides seed and plants of the spinach line designated SMB66-1114F. The invention thus relates to the plants, seeds and tissue cultures of spinach line SMB66-1114F, and to methods for producing a spinach plant produced by crossing a plant of spinach line SMB66-1114F with itself or with another spinach plant, such as a plant of another line. The invention further relates to seeds and plants produced by such crossing. The invention further relates to parts of a plant of spinach line SMB66-1114F, including the fruit and gametes of such plants. | 2010-02-04 |
20100031385 | SPINACH LINE MSA66-1119M - The invention provides seed and plants of the spinach line designated MSA66-1119M. The invention thus relates to the plants, seeds and tissue cultures of spinach line MSA66-1119M, and to methods for producing a spinach plant produced by crossing a plant of spinach line MSA66-1119M with itself or with another spinach plant, such as a plant of another line. The invention further relates to seeds and plants produced by such crossing. The invention further relates to parts of a plant of spinach line MSA66-1119M, including the fruit and gametes of such plants. | 2010-02-04 |
20100031386 | SWEET PEPPER LINE SBY28-1223 - The invention provides seed and plants of the pepper line designated SBY28-1223. The invention thus relates to the plants, seeds and tissue cultures of pepper line SBY28-1223, and to methods for producing a pepper plant produced by crossing a plant of pepper line SBY28-1223 with itself or with another pepper plant, such as a plant of another line. The invention further relates to seeds and plants produced by such crossing. The invention further relates to parts of a plant of pepper line SBY28-1223, including the fruit and gametes of such plants. | 2010-02-04 |
20100031387 | PREVENTION OF TRANSGENE ESCAPE IN GENETICALLY MODIFIED PERENNIALS - Genes can be introduced into plants that confer desirable traits such as, drought and stress tolerance, insect and pest resistance, as well as environmental qualities such as phyto-remediation. However, possibility for transgene escape to wild and non-transformed species raises commercial and ecological concerns. Disclosed herein are methods and compositions for generating sterile perennial plants for the prevention of transgene escape. For example, sterile switchgrass can be produced using these methods, for example which can be used to produce biofuel. | 2010-02-04 |
20100031388 | MUTANT HISTIDINE KINASE THAT CONFERS SPONTANEOUS NODULATION IN PLANTS - Formation of nitrogen fixing root nodules in legumes is induced by perception of lipochitin-oligosaccharide signal molecules secreted by compatible | 2010-02-04 |
20100031389 | Plants Having Enhanced Yield-Related Traits And A Method For Making The Same Using Consensus Sequences From The Yabby Protein Family - The present invention relates generally to the field of molecular biology and concerns a method for enhancing various economically important yield-related traits in plants. More specifically, the present invention concerns a method for enhancing yield-related traits in plants by modulating expression in a plant of a nucleic acid encoding an CRC-related (Crabs Claw) polypeptide. The present invention also concerns plants having modulated expression of a nucleic acid encoding such a CRC-related protein, which plants have enhanced yield-related relative to control plants. The invention also provides constructs useful in the methods of the invention. | 2010-02-04 |
20100031390 | Gibberellin 2-Oxidase - A nucleic acid sequence is provided which encodes a gibberellin 2-oxidase gene which catalyses the 2β-oxidation of a gibberellin molecule to introduce a hydroxyl group at C-2 and further catalyses the oxidation of the hydroxyl group introduced at C-2 to yield the ketone derivative. Such sequences can find application in the preparation of transgenic plants with altered levels of gibberellin 2-oxidase. | 2010-02-04 |
20100031391 | ANTIFUNGAL POLYPEPTIDES - Compositions and methods for protecting a plant from a pathogen, particularly a fungal pathogen, are provided. Compositions include an amino acid sequence, and variants and fragments thereof, for an antipathogenic polypeptide that was isolated from a fungal fermentation broth. Nucleic acid molecules that encode the antipathogenic polypeptides of the invention, and antipathogenic domains thereof, are also provided. A method for inducing pathogen resistance in a plant using the nucleotide sequences disclosed herein is further provided. The method comprises introducing into a plant an expression cassette comprising a promoter operably linked to a nucleotide sequence that encodes an antipathogenic polypeptide of the invention. Compositions comprising an antipathogenic polypeptide or a transformed microorganism comprising a nucleic acid of the invention in combination with a carrier and methods of using these compositions to protect a plant from a pathogen are further provided. Transformed plants, plant cells, seeds, and microorganisms comprising a nucleotide sequence that encodes an antipathogenic polypeptide of the invention are also disclosed. | 2010-02-04 |
20100031392 | SUGAR AND LIPID METABOLISM REGULATORS IN PLANTS VI - Isolated nucleic acids and proteins associated with lipid and sugar metabolism regulation are provided. In particular, lipid metabolism proteins (LMP) and encoding nucleic acids originating from | 2010-02-04 |
20100031393 | NOVEL PROTEIN HAVING ACYLTRANSFERASE ACTIVITY AND GENE ENCODING THE SAME - This invention provides a means for obtaining flowering plants with a novel flower color, and a method for producing a plant having petals with a novel flower color by use of a novel acyltransferase protein and the gene encoding the same. | 2010-02-04 |
20100031394 | Human Blood Proteins Expressed in Monocot Seeds - The invention is directed to blood proteins produced in monocot seeds and isolated therefrom for use in therapeutic compositions, and to methods of making these isolated blood proteins and to therapeutic compositions comprising them. | 2010-02-04 |
20100031395 | PHOTOSYNTHETICORGANISMS AND COMPOSITIONS AND METHODS OF GENERATING SAME - An isolated polynucleotide is provided. The isolated polynucleotide comprising a nucleic acid sequence encoding a polypeptide of a Type II reaction center of a photosynthetic organism, the nucleic acid sequence being capable of imparting the type II reaction center with an activity under a temperature range different than that of the type II reaction center endogenous to the photosynthetic organism. Also provided are methods of using the sequences for generating photosynthetic organisms or tailor-made thermotolerance. | 2010-02-04 |
20100031396 | Methods and Constructs for Producing Transgenic Plants and Methods of Recovering Expressed Proteins - This invention relates to a regulatory element useful for genetically engineering sugarcane or other monocots, to the transformation of the monocots with the regulatory element so that they produce a desired product, and to the regeneration of the monocots transformed with the regulatory element. In particular the present invention provides a nucleic acid encoding the promoter of a sugarcane proline rich protein as shown in SEQ ID NO: 5. | 2010-02-04 |
20100031397 | NUCLEOTIDE SEQUENCES AND POLYPEPTIDES ENCODED THEREBY USEFUL FOR MODIFYING PLANT CHARACTERISTICS - Isolated polynucleotides and polypeptides encoded thereby are described, together with the use of those products for making transgenic plants. | 2010-02-04 |
20100031398 | GENES ENCODING CHAVICOL/EUGENOL SYNTHASE FROM THE CREOSOTE BUSH LARREA TRIDENTATA - Particular aspects provide novel methods for redirecting carbon allocation in plants or cell culture from lignification to inherently more useful and tractable materials, and to facilitate the generation of, e.g., biofuels from the remaining plant roculture biomass. Particular aspects provided novel methods for converting monolignols into allyl/propenyl phenols, and for chavicol/eugenol formation or production. Additional aspects relate to the discovery of novel chavicol/eugenol synthases that convert p-coumaryl/coniferyl alcohol esters into chavicol/eugenol, and to novel compositions (e.g., novel proteins and nucleic acids encoding same), and novel methods using same for producing or forming chavicol/eugenol and other derivatives in cell culture and/or genetically modified plants, and for re-engineering the composition of plant biomass. Particular aspects provide novel methods for generation in culture or in planta of liquid/combustible allyl/propenyl phenols, and these phenolic products are utilized for (non-ethanol) biofuel/bioenergy purposes, while the remaining plant biomass facilitates the generation of other biofuels. | 2010-02-04 |
20100031399 | Polypeptides having alpha-glucuronidase activity and polynucleotides encoding same - The present invention relates to isolated polypeptides having alpha-glucuronidase activity and isolated polynucleotides encoding the polypeptides. The invention also relates to nucleic acid constructs, vectors, and host cells comprising the polynucleotides as well as methods of producing and using the polypeptides. | 2010-02-04 |
20100031400 | Polypeptides having acetylxylan esterase activity and polynucleotides encoding same - The present invention relates to isolated polypeptides having acetylxylan esterase activity and isolated polynucleotides encoding the polypeptides. The invention also relates to nucleic acid constructs, vectors, and host cells comprising the polynucleotides as well as methods of producing and using the polypeptides. | 2010-02-04 |
20100031401 | Precise breeding - The present invention relates to a method for identifying and isolating native plant nucleic acid sequences that may function as T-DNAs or T-DNA border-like sequences, effecting the transfer of one polynucleotide into another polynucleotide. The present invention also provides a modified tuber, such as a genetically modified mature tuber, that comprises at least one trait that is not exhibited by a non-modified tuber of the same species. | 2010-02-04 |