11th week of 2010 patent applcation highlights part 67 |
Patent application number | Title | Published |
20100071013 | IDENTIFYING EVENTS OF INTEREST WITHIN VIDEO CONTENT - Instant messages sent by a viewer of a video while the video is perceivable to the viewer may be monitored. An event of interest occurring in the video may be identified based on the monitored instant messages. Metadata that describes the event of interest may be generated and assigned to the video. A request for video content associated with the video may be received from a user. An indexed collection of videos that includes the video may be searched for the requested video content. Based on the search, it may be determined that the video satisfies the user's request. The event of interest occurring in the video may be identified based on the metadata assigned to the video. User perception of a scene from the video that includes the event of interest may be enabled. | 2010-03-18 |
20100071014 | METHOD AND SYSTEM FOR DISTRIBUTING MEDIA CONTENT - A system that incorporates teachings of the present disclosure may include, for example, a set-top box operating from an interactive television (iTV) communication system having a controller to receive from the iTV communication system media content with metadata, record the media content, detect in the metadata a description of the media content correlating with one or more preferences in a preference profile, present at a media presentation device a first prompt requesting an acceptance or rejection of the media content, present at the media presentation device a second prompt requesting a selection of one or more communication devices to direct in whole or in part the media content thereto, detect the selection of at least one of the one or more communication devices, and transmit in whole or in part the media content to the at least one communication device. Other embodiments are disclosed. | 2010-03-18 |
20100071015 | APPARATUS FOR VIDEO AND AUDIO REPRODUCTION - According to an embodiment, displays a message displaying area is able to utilized as a messenger function and a schedule displaying area is able to utilized as a scheduler function in a display device of a television function part based on control information and setting information analyzed by an advanced function control module in a remote control part in accordance with a clock time managed by a clock module when a commercial power is connected with an image processing module, a display, a audio processing module, a audio reproducer, and a graphic processing module through a power supply. | 2010-03-18 |
20100071016 | METHOD OF MEASURING A SIMILARITY DEGREE OF DIGITAL VIDEO CONTENTS, METHOD OF MANAGING VIDEO CONTENTS USING THE SAME AND MANAGEMENT SYSTEM FOR VIDEO CONTENTS USING THE METHOD OF MANAGING VIDEO CONTENTS - A method of measuring a similarity degree of digital video contents is provided as follows. Firstly, scene conversion of a video content is detected to divide the video content into a plurality of scenes. Then, a first scene feature is extracted from a first scene of the divided scenes. Thereafter, a similarity degree is measured by comparing the extracted first scene feature of the first scene with a second scene feature of a second scene. Thus, a similarity degree of digital video contents may be effectively measured, the digital video contents may be prevented from illegal sharing, and additional contents information related to the digital video contents may be provided when playing the digital video contents. Therefore, the method may be effectively used in contents management and contents circulation. | 2010-03-18 |
20100071017 | Distributing video assets - Video assets ( | 2010-03-18 |
20100071018 | WIRELESS VIDEO TRANSMISSION DEVICE, WIRELESS VIDEO RECEPTION DEVICE, WIRELESS COMMUNICATION SYSTEM, AND CEC MESSAGE TRANSMISSION METHOD USED THEREFOR - After fixing the physical address of a wireless video transmission device to a route address or the like, it is possible to shorten the switchover time by having a conversion table provided that maps the physical addresses on the wireless video reception device side, since it does not occur that the addresses of AV equipment connected by wire with the wireless video transmission device are changed, even if the physical address of the wireless video reception device changes. Further, by performing split transfer of the CEC messages, it is possible to carry out transmission of the CEC messages promptly and to suppress reception confirmation bits with respect to CEC messages for which there exists no destination. | 2010-03-18 |
20100071019 | EFFICIENT MOBILE RECEIVER AUTOPROGRAMMING - A mobile receiver is programmed with available channels by initially searching for all potentially available channels and autoprogramming the receiver with channels that are detected by the receiver. Subsequently, only potentially available channels that have not been programmed into the receiver are searched for to reduce autoprogramming time when, e.g., the mobile receiver is carried to a higher elevation. | 2010-03-18 |
20100071020 | SYSTEMS AND METHODS FOR DISTRIBUTING SOFTWARE FOR A HOST DEVICE IN A CABLE SYSTEM - Flexible systems and methods are disclosed that may be used for provisioning, configuring, and controlling a host embodied in a cable set top box or other digital device attached to a digital communication network, such as cable distribution network. An enhanced services system maintains various host files for various types of hosts that a cable subscriber may purchase and connect to the cable network. The Enhanced Services Server interacts with the host using the host files. The host files may be downloaded from the host manufacturer into a database that distributes the modules as required to the various enhanced services systems. The host may be purchased by the cable subscriber and provisioning may be initiated by the retailer at the time of purchase using a provisioning network interacting with the appropriate cable system serving the subscriber. This abstract is not intended to limit or construe the scope of the claims. | 2010-03-18 |
20100071021 | SYSTEM FOR CONTROLLING MEDIA PRESENTATIONS - A system that incorporates teachings of the present disclosure may include, for example, a remote controller that manages operations of a set-top box (STB) having a radio frequency (RF) transceiver, a user interface (UI) with one or more components, and a controller operably coupled to the RF transceiver and the UI. The controller can be adapted to cause the RF transceiver to establish a communication session with a subsystem of an interactive media communication system, cause the RF transceiver to transmit to the subsystem a request for media content, cause the UI to present media content supplied by the subsystem without interrupting operations of the STB, and cause the RF transceiver to transmit to the subsystem one or more commands directed to the STB. Other embodiments are disclosed. | 2010-03-18 |
20100071022 | EVENT DISPLAY CONTROLLED BYINTERACTIVE DIGITAL TV APPLICATION - An event display device or panel ( | 2010-03-18 |
20100071023 | Low Noise Block Control Circuit - One embodiment may take the form of a control circuit that provides a combined power signal and control signal to an LNB of a satellite system. The control circuit output may be transmitted to an LNB by a set-top box (STB) such that the STB may control the LNB. The control circuit may accept an enable signal from the STB to alter the circuit from a transmitting circuit to a receiving circuit. The control circuit may also integrate the functionality of a low pass filter into the communication signal circuit, thereby removing the need for a low pass filter at a power supply output. The control circuit may also provide a low overall power consumption of the circuit by isolating the communication signal from the power supply signal before the signals are combined. | 2010-03-18 |
20100071024 | HIERARCHICAL APPLICATION OF SECURITY SERVICES WITHIN A COMPUTER NETWORK - In general, techniques are described for hierarchical application of security services with a network device. In particular, the network device receives security classification information that maps a security class to one or more computing devices. The security class identifies security capabilities of the computing devices. The network device also receives network traffic associated with the computing device and applies a set of patterns defined by a policy associated with the security class to the network traffic to detect a set of network attacks. Based on the application of the set of patterns, the network device forwards the network traffic. As a result of receiving security classification information, the network device may become aware of the security capabilities of the computing device and only apply those patterns required to augment these detected security capabilities, thereby preventing application of overlapping security services through application of these services in a hierarchical manner. | 2010-03-18 |
20100071025 | SECURING LIVE MIGRATION OF A VIRTUAL MACHINE WITHIN A SERVICE LANDSCAPE - In an embodiment of the invention, a method for secure live migration of a virtual machine (VM) in a virtualized computing environment can include selecting a VM in a secure virtualized computing environment for live migration to a different virtualized computing environment and blocking data communications with the selected VM and other VMs in the secure virtualized computing environment. The selected VM can be live migrated to the different virtualized computing environment and the VM cna be restarted in the different virtualized computing environment. Notably, a secure communicative link can be established between the restarted VM and at least one other of the VMs in the secure virtualized computing environment. Finally, data communications between the restarted VM and the at least one other of the VMs can be enabled over the secure communicative link. | 2010-03-18 |
20100071026 | WIDGET HOST CONTAINER COMPONENT FOR A RAPID APPLICATION DEVELOPMENT TOOL - A widget host container serves as a component that may be added via a rapid application development tool, such as Oracle International Corporation's Application Development Framework. The rapid application development tool may be used to install the widget host container, for example, in a region of a user interaction environment, such as an application or a suite of user interactive applications, created by the rapid application development tool. If desired, one or more selection devices, such as a drop down menu, may be provided to select particular widgets for use and display. Features may be provided for organizing both personal and enterprise widgets. Security settings control access to web widgets, and an option to allow or restrict access to web widget display options in the container. | 2010-03-18 |
20100071027 | METHOD OF PROVIDING A MIXED GROUP COMMUNICATION SESSION - A method of providing a mixed group communication session for a mixed group containing protected users and a guest user is provided. The method uses a secure server to assign temporary Identities (IDs) to the protected users. The secure server forms a mixed group session containing desired participants from among the protected users and the guest user. The secure server provides limited group rights to the guest user in the mixed group session. During the mixed group session, the secure server uses the permanent IDs of the protected users towards other protected users and temporary IDs of the permanent users towards the guest user. Also provided is a method for providing a mixed group communication session for a mixed group containing protected users and a guest user, wherein temporary IDs are assigned to protected users and the guest user. | 2010-03-18 |
20100071028 | Governing Service Identification In A Service Oriented Architecture ('SOA') Governance Model - Methods and systems for governing service identification in an SOA governance model according to embodiments of the present invention are provided. Embodiments include receiving a set of input parameters for identifying candidate services for the SOA; determining whether the set of input parameters comply with a predetermined input parameter validation policy. If the set of input parameters comply with a predetermined input parameter validation policy, governing service identification includes identifying in dependence upon the set of input parameters one or more candidate services available for the SOA in existing SOA business applications and determining whether each candidate services available in existing SOA business applications comply with a predetermined service selection policy. If one of the candidate services available in existing SOA business applications complies with a predetermined service selection policy, governing service identification includes selecting the candidate service as a service available for the SOA and communicating the identification of that selected service to relevant stakeholders in the SOA. | 2010-03-18 |
20100071029 | Method for Granting an Access Authorization for a Computer-Based Object in an Automation System, Computer Program and Automation System - An access authorization for a computer-based object in an automation system comprising a plurality of network nodes is granted using a control file which is structured in line with a scheme for a markup language for granting access authorizations and which maps a hierarchic tree structure. In this case, access authorizations are mapped in an object model which has a hierarchic tree structure. A relevant subtree from the object model is ascertained for a selected network node, at which services are provided using computer-based objects, or when access to a computer-based object is requested, by an access guideline service. The control file is produced from the ascertained relevant subtree. The control file produced is made available for the selected network node or for access to the computer-based object. | 2010-03-18 |
20100071030 | METHOD AND SYSTEM FOR SECURELY IDENTIFYING COMPUTER STORAGE DEVICES - In a private network setting in which various computers can be attached, the confidential or sensitive data within the various devices on the private network is vulnerable. The ability to copy such confidential or sensitive data to a storage device communicatively coupled to a client computer on the network is governed and controlled. Only devices that include an authentic stamp or digital certificate can be accessed by client computers. If a device does not have a valid stamp or the stamp has been black listed, then the access to the device can be prevented or greatly limited. | 2010-03-18 |
20100071031 | MULTIPLE BIOMETRIC SMART CARD AUTHENTICATION - Techniques for multiple biometric smart card authentication are provided. At least two biometric readings are obtained from a requesting user. Both biometric readings are verified before access to resources of a smart card are made available to the requesting user. | 2010-03-18 |
20100071032 | Techniques for Authenticated Posture Reporting and Associated Enforcement of Network Access - Architectures and techniques that allow a firmware agent to operate as a tamper-resistant agent on a host platform that may be used as a trusted policy enforcement point (PEP) on the host platform to enforce policies even when the host operating system is compromised. The PEP may be used to open access control and/or remediation channels on the host platform. The firmware agent may also act as a local policy decision point (PDP) on the host platform in accordance with an authorized enterprise PDP entity by providing policies if a host trust agent is non-responsive and may function as a passive agent when the host trust agent is functional. | 2010-03-18 |
20100071033 | AUTHENTICATION COORDINATION SYSTEM, TERMINAL APPARATUS, STORAGE MEDIUM, AUTHENTICATION COORDINATION METHOD, AND AUTHENTICATION COORDINATION PROGRAM - In remotely coupling one terminal apparatus to a server apparatus, if an authentication processing of a user of one terminal apparatus has been already completed, the user can switch one terminal apparatus to another without an additional authentication processing. Authenticated information indicating that the authentication of the user has already been successfully completed is transferred to another terminal apparatus by coordinating the authenticated information between more than one terminal apparatuses. Another terminal apparatus receives a service from the server apparatus using the authenticated information. Upon coordinating the authenticated information among more than one terminal apparatuses, another terminal apparatus to receive the authenticated information may be authenticated. A storage medium which conducts the authentication may be coupled to a terminal apparatus to be authenticated. | 2010-03-18 |
20100071034 | SYSTEM FOR PREVENTING UNAUTHORIZED ACQUISITION OF INFORMATION AND METHOD THEREOF - A system including a server apparatus executes an application program and a client apparatus enabling a user to utilize the application program by communicating with the server apparatus based on an instruction of the user. The server apparatus includes: an output detection section for detecting output-processing which is processing of outputting data from the application program into a shared area; and an output control section for storing instruction information in the shares area, instead of storing the output data outputted from the application program therein, in response to the detection of the output-processing, the instruction information specifying an acquisition method by which an authorized client apparatus acquires the output data. The client apparatus includes: a reading detection section for detecting reading-processing which is processing of reading data from the shared area; and a reading control section which reads the instruction information from the shared area in response to the detection of the reading-processing, and which acquires the output data by the acquisition method specified by the instruction information. | 2010-03-18 |
20100071035 | METHODS AND SYSTEMS FOR SECURELY MANAGING VIRTUALIZATION PLATFORM - Virtualization platforms and management clients therefor are communicatively coupled to one another via a control layer logically disposed therebetween. The control layer is configured to proxy virtualization management commands from the management clients to the virtualization platforms, but only after successful authentication of users (which may include automated agents and processes) issuing those commands and privileges of those users as defined by access control information accessible to the control layer. The control layer may be instantiated as an application running on a physical appliance logically interposed between the virtualization platforms and management clients, or a software package running on dedicated hardware logically interposed between the virtualization platforms and management clients, or as an application encapsulated in a virtual machine running on a compatible virtualization platform logically interposed between the virtualization platforms and management clients. | 2010-03-18 |
20100071036 | METHOD AND APPARATUS FOR REDISTRIBUTION SYSTEM - A method and apparatus for distributing at least one of documents or data to their respective owners. The method comprising receiving at least one of the documents or the data from users, associating the at least one of the documents or the data with users' login, wherein the users are owners of their respective at least one documents or data, and simultaneously scheduling the distribution of the at least one of the documents or the data to their respective owners. | 2010-03-18 |
20100071037 | SYSTEM FOR RESTRICTING CONTENT ACCESS AND STORAGE - UIMID of a UIM | 2010-03-18 |
20100071038 | NETWORK-AGNOSTIC CONTENT MANAGEMENT - System(s) and method(s) are provided for content management, e.g., exchange and manipulation, across devices provisioned through disparate network platforms. Devices can be mobile or stationary, and connect to provisioning network platforms through various network bearers. Through various secure protocols, a client component within a device secures access to content and provides secure delivery thereof Directives for content manipulation are also delivered securely. Delivery of contents and directives are performed from device to device, routed via gateway nodes within a network platform that provisions the device. In addition, or alternatively, content management can be implemented through an intermediary component, which can also validate devices and secure delivery of content or directives. Alarm signaling among devices provisioned through disparate network platforms also can be securely conveyed. Intermediary component also can be exploited for content management among subscribers of disparate network providers. | 2010-03-18 |
20100071039 | IMAGE SHARING SERVER, SYSTEM, METHOD, AND RECORDING MEDIUM - The present invention provides a mechanism for efficiently using the resources of a server for an image sharing service. According to an aspect, an image information management server includes an image information storage device for storing original image storage information for identifying an original image (original image data) stored in each terminal. The original image itself is accumulated in respective terminals instead of a server and the image is distributed and shared between the terminals via the server. | 2010-03-18 |
20100071040 | SECURE SERVER CERTIFICATE TRUST LIST UPDATE FOR CLIENT DEVICES - A method, a network element, and a client device for creating a trusted connection with a network are disclosed. A client device | 2010-03-18 |
20100071041 | IDENTIFICATION INFORMATION INTEGRATED MANAGEMENT SYSTEM, IDENTIFICATION INFORMATION INTEGRATED MANAGEMENT SERVER, AND COMPUTER READABLE RECORDING MEDIUM RECORDING IDENTIFICATION INFORMATION INTEGRATED MANAGEMENT PROGRAM THEREON - The present application relates to a technique applied to a system for performing authentication of a user by a one-to-one verification method by using an ID and biometric information of the user. When the user registers the ID and reference biometric information in a service providing system, the information is transmitted from the relevant service providing system to a management server. Then, in the management server, ID management by the reference biometric information is performed, and when the user inputs a wrong ID at the time of verification before the relevant service providing system starts to provide a service, a correct ID of the relevant user is found. | 2010-03-18 |
20100071042 | SELECTION AND APPLICATION OF ROLES AND SYSTEMS BASED ON USERNAME AND LAYOUT ID - In one embodiment a computing system comprises one or more processors, a display device coupled to the computing system, and a memory module communicatively connected to the one or more processors. The memory module comprises logic to receive, in a connection server, a service request from a user via a remote connection client, wherein the service request comprises at least one of a user credential, a connection client identifier, and a layout identifier, authenticate, in the connection server, the user credential and the connection client identifier, retrieve, in the connection server, a user profile associated with the user, a connection client layout associated with the layout identifier, connection data for at least one remote system, and a policy associated with the user profile, and transmit the user profile, the connection client layout, a remote system and the connection data for a remote system and a policy associated with the user profile from the connection server to the remote connection client. | 2010-03-18 |
20100071043 | UNINTERRUPTED VIRTUAL PRIVATE NETWORK (VPN) CONNECTION SERVICE WITH DYNAMIC POLICY ENFORCEMENT - Techniques for uninterrupted virtual private network (VPN) connection service with dynamic policy enforcement are provided. An existing VPN session between a VPN client and a VPN server detects a change in a VPN network being used for the existing VPN session. New credentials and new policies are received by the VPN client. The new credentials are automatically used to re-authenticate the VPN client to the change during the existing VPN session, and the new policies are dynamically used to enforce the new policies during the existing VPN session on the VPN client. | 2010-03-18 |
20100071044 | Method for tracking location of patients and doctors in a medical office or hospital practice - A method of operating a paperless medical office or hospital practice office of multiple physicians seeing multiple patients during the course of a single day through the use of radio-frequency identification transponder tags secured within the walls, ceilings and/or doors of examination and consultation rooms of a health-care environment in cooperation with codified smart cards or fingerprint scans in physician carried tablet PC's to supply medical record and like information relevant to a patient only to the physician with whom such patient is meeting at any given instant of time. | 2010-03-18 |
20100071045 | Information Processing Apparatus and Information Processing Method - An information processing apparatus includes: a first storage module configured to store addresses of websites and pieces of login information being correlated with the addresses, the login information that are required for logging in the respective websites; and a second storage module configured to store the addresses of the websites and command files being correlated with the addresses, the command files containing a login operation procedure to be executed on a login page of a website that includes an entry field for login information. | 2010-03-18 |
20100071046 | Method and System for Enabling Access to a Web Service Provider Through Login Based Badges Embedded in a Third Party Site - A system and method which may allow a user to login a web service provider from a third party site without leaking the user's login information to the third party site. A service request interceptor may authenticate the third party site to make sure that a service request is from a third party site registered with the web service provider or its associated sites, and then instruct a badging server to send an HTML markup to the third party site to enable a login page of the web service provider to be displayed as a pop up window, outside of the third party site. Before sending the instructions to the badging server, the service request interceptor may check whether the user has already logged in the web service provider, and authenticate a user to make sure that the user is registered with the web service provider. Since the user may interact with the web service provider directly, the third party site may be bypassed and users' credentials may be better protected. | 2010-03-18 |
20100071047 | Authentication system, terminal and information processing device, having function of performing stable authentication - To provide an authentication system allowing stable determination as to whether a user is a registered user while saving user's trouble, an information processing device capable of data communication with a plurality of image forming apparatuses extracts an image forming apparatus connected to an IC card reader from the plurality of image forming apparatuses, based on reply signals transmitted from the plurality of image forming apparatuses, and transmits user account information of registered users to the extracted image forming apparatus. The image forming apparatus connectable to the IC card reader performs, if it is determined that the IC card reader is connected to the image forming apparatus, the authentication process based on the user account information of registered users received from the information processing device and on the information read by the IC card reader. | 2010-03-18 |
20100071048 | SERVICE BINDING - Embodiments for performing service binding between a client and a target server are disclosed. In accordance with one embodiment, a clear text client service binding value is received from a client at the target server, the client service binding value is compared to a server service binding value, and a communication channel is formed between the client and the target server when the client service binding value matches the server service binding value. | 2010-03-18 |
20100071049 | A METHOD FOR IDENTIFYING A TASK AUTHORIZATION - In an ad hoc mesh network, roles are assignment to the different network nodes, for example mesh point or mesh portal. The invention envisages that a network node identifies the certification and thus the permitted roles of another network node before it sends a message to said other network node. This ensures that the roles maintain their integrity and the security in the network is enhanced. | 2010-03-18 |
20100071050 | OPTIMIZING STATE SHARING BETWEEN FIREWALLS ON MULTI-HOMED NETWORKS - In one embodiment, a security device monitors for outgoing re-transmission messages indicating that an endpoint located in a multi-homed network transmitted an unanswered initial connection request. Responsive to identifying one of the outgoing re-transmission messages, the security device identifies destination address information included in the identified re-transmission message. The security device then causes another security device associated with a different link of the same multi-homed network to update its internal state table according to the identified destination address information. As a result, a response to the outgoing re-transmission can be forwarded to the multi-homed network regardless of which security device receives the response. | 2010-03-18 |
20100071051 | System and method for exposing malicious sources using mobile IP messages - Malicious sources within networks are identified using bait traffic, including mobile IP messages, transmitted between a collaborating network device and a collaborating mobile client that has a fixed connection to the network. The bait traffic entices a malicious source to transmit malicious packets towards the collaborating mobile client and/or the network device. Upon receiving a malicious packet, the collaborating mobile client or the network device is able to identify the source of the packet as a malicious source and report the presence of the malicious source within the network. | 2010-03-18 |
20100071052 | REVERSE PROXY ARCHITECTURE - Aspects of the subject matter described herein relate to a reverse proxy architecture. In aspects, a client that seeks to access a Web document via a proxy sends a request to the reverse proxy. The reverse proxy obtains the Web document from a server indicated by the request and modifies links therein so that if the links are clicked on or otherwise fetched by the client, the communication goes back to the reverse proxy. The reverse proxy may also modify cookies, if needed, so that the cookies refer to a domain or hostname associated with the reverse proxy. | 2010-03-18 |
20100071053 | Presence Status Notification From Digital Endpoint Devices Through A Multi-Services Gateway Device At The User Premises - A gateway device for operation at a user premises to provide and manage application services provided for endpoint devices associated with the gateway device. The gateway device includes a communications client program to enable client-server communications between the gateway device and a remote communications server via the wide area network using a presence and networking message protocol. The gateway device utilizes at least one driver program with a driver communications protocol to communicate with, control, and manage associated endpoint devices. The communications client program interacts with the driver program, and the gateway device is configured to specify which associated endpoint devices, attributes and operations are exposed to the network via the communications client. The gateway device is configured to specify rules for presentation and/or notification of incoming presence and networking messages to the gateway device and the routing of those messages to the managed endpoint device through their respective drivers. | 2010-03-18 |
20100071054 | NETWORK SECURITY APPLIANCE - Systems and methods for combating and thwarting attacks by cybercriminals are provided. Network security appliances interposed between computer systems and public networks, such as the Internet, are configured to perform defensive and/or offensive actions against botnets and/or other cyber threats. According to some embodiments, network security appliances may be configured to perform coordinated defensive and/or offensive actions with other network security appliances. | 2010-03-18 |
20100071055 | Two Parallel Engines for High Speed Transmit IPSEC Processing - The invention relates to a network interface system for interfacing a host system with a network. The network interface system includes a bus interface system, a media access control system, and a security system. The network interface offloads IPsec processing from the host processor. According to the invention, the security system includes two processors for encrypting and authenticating the outgoing data. Outgoing data packets are sent alternately to one or the other processor, whereby transmission processing can be accelerated relative to receive processing. | 2010-03-18 |
20100071056 | METHOD AND SYSTEM FOR MULTI-PROTOCOL SINGLE LOGOUT - A method for multi-protocol logout. The method includes receiving, by a first identity provider, a logout request from a user agent, wherein the first identity provider executes in a federation manager, and initiating a logout on a service provider associated with the first identity provider based on the logout request by the first identity provider. The method further includes identifying, by the federation manager, a plurality of identity providers associated with the user agent, wherein the plurality of identity providers communicate using heterogeneous federation protocols, and initiating, by the federation manager, a logout on each of the plurality of identity providers based on the logout request using the plurality of heterogeneous federation protocols. The method further includes initiating, by the plurality of identity providers, a logout of each service provider corresponding to the plurality of identity providers, identifying a status of each logout, and sending the status to the user agent. | 2010-03-18 |
20100071057 | REAL-TIME EQUIPMENT BEHAVIOR SELECTION - At creation, a state machine of an industrial control configuration can be hard-coded with a number of states in a hierarchical manner. Once implemented into the configuration, it can be desirable for the states, interpretations of the states, and the like to be modified in accordance with particular desires and processes. Therefore, a user can select a change to a hierarchical rule set of the state machine while the state machine is part of the configuration and the change can be implemented. | 2010-03-18 |
20100071058 | ELECTRONIC DEVICE AND CONTROLLING METHOD OF ELECTRONIC DEVICE - The present invention provides an electronic device for performing a typical processing by storing a predetermined operating procedure and reproducing the stored operating procedure that controls suspending storing information related to an authentication, which includes a control unit, when an operation requiring a predetermined authentication is performed at the time when the predetermined operating procedure is stored. | 2010-03-18 |
20100071059 | Information processing system, input apparatus, and information processing method - An information processing system uses an input apparatus to input user information. After authentication of the user information, the input apparatus-transmits control information to an information processing apparatus, indicating which functions of the information processing apparatus the user may use. The control information is independent of the particular method by which authentication is performed. Use of the information processing apparatus can accordingly be controlled by a variety of methods without requiring any user authentication capability to be provided in the information processing apparatus itself, and new authentication methods can be implemented without modification or replacement of existing information processing apparatus. | 2010-03-18 |
20100071060 | ELECTRONIC DEVICE AND METHOD FOR VERIFYING USER IDENTIFICATION - A method for verifying user identification receives an original symbol input by a user via a touch screen of an electronic device. A symbolic password is determined according to the original symbol. The method receives a login symbol input by the user via the touch screen and determines if the login symbol matches the symbolic password. The user is allowed to access the electronic device if the login symbol matches the symbolic password. | 2010-03-18 |
20100071061 | Method and Apparatus for Whole-Network Anomaly Diagnosis and Method to Detect and Classify Network Anomalies Using Traffic Feature Distributions - To improve network reliability and management in today's high-speed communication networks, we propose an intelligent system using adaptive statistical approaches. The system learns the normal behavior of the network. Deviations from the norm are detected and the information is combined in the probabilistic framework of a Bayesian network. The proposed system is thereby able to detect unknown or unseen faults. As demonstrated on real network data, this method can detect abnormal behavior before a fault actually occurs, giving the network management system (human or automated) the ability to avoid a potentially serious problem. | 2010-03-18 |
20100071062 | MECHANISM FOR IDENTIFYING MALICIOUS CONTENT, DoS ATTACKS, AND ILLEGAL IPTV SERVICES - Mechanism for identifying malicious content, DoS attacks, and illegal IPTV services. By monitoring the characteristics of various control messages being transmitted within a network that services Internet protocol television (IPTV) content to identify suspicious behavior (e.g., such as that associated with malicious content, denial of service (DoS) attacks, IPTV service stealing, etc.). In addition to monitoring control messages within such a network, deep packet inspection (DPI) may be performed for individual packets within an IPTV stream to identify malicious content therein (e.g., worms, viruses, etc. actually within the IPTV stream itself). By monitoring control messages and/or actual IPTV content within a network (e.g., vs. at the perimeter of a network only), protection against both outside and inside attacks can be effectuated. This network level basis of operation effectively guards against promulgation of malicious content to other devices within the network. | 2010-03-18 |
20100071063 | SYSTEM FOR AUTOMATIC DETECTION OF SPYWARE - An automatic system for spyware detection and signature generation compares packets of output from a computer in response to standard user inputs, to packets of a standard output set derived from a known clean machine. Differences between these two packet sets are analyzed with respect to whether they relate to unknown web servers and whether they incorporate user-derived information. This analysis is used to provide an automatic detection of and signature generation for spyware infecting the machine. | 2010-03-18 |
20100071064 | APPARATUS, SYSTEMS, AND METHODS FOR CONTENT SELFSCANNING IN A STORAGE SYSTEM - Apparatus, systems, and method for content self-scanning within a storage system. Features and aspects hereof operable within a storage controller of a storage system scan blocks of data within the storage system to detect the presence of a pattern in one or more data blocks. The patterns to be matched may be stored as regular expressions in a pattern database in the storage system and may represent, for example, viruses to be detected in the data blocks of the storage system. Data blocks may be scanned, in real time, as they are received from an attached host system. Data blocks may also be retrieved from within the storage system for scanning. The storage system may cooperate with a scanning service computer to determine a file of data blocks related to any data block that matches a portion of a pattern. | 2010-03-18 |
20100071065 | INFILTRATION OF MALWARE COMMUNICATIONS - Infiltration of malware communications. Malicious programs infecting individual devices within a network oftentimes communicate with another infected device (e.g., a master device by which the infection was established on a slave device in the first place). During this call home to a master device (or receiving a call from the master device), vital information about the attack, target, master device, etc. may be transmitted. The call home may include information acquired/retrieved from the infected device, or it may request additional information from the infecting device. By monitoring the network messages associated with such call home attempts (including any errors associated therewith), an infected device may be identified and appropriate action be taken (e.g., continue monitoring, isolate infected device from network, generate call to network help desk, etc.). This approach may be implemented at a network level to help prevent further promulgation of the malicious program to other devices. | 2010-03-18 |
20100071066 | SYSTEM, METHOD AND PROGRAM PRODUCT FOR DYNAMICALLY PERFORMING AN AUDIT AND SECURITY COMPLIANCE VALIDATION IN AN OPERATING ENVIRONMENT - A system, method and program product for dynamically performing an audit and security compliance validation. The method includes providing a tool for performing a compliance check of installed computer applications running on a system, the tool including a first set and a second set of plug-ins. Further, the method includes scanning the system, using plug-ins selected from the first set to obtain a current inventory of applications currently installed on the system and selecting plug-ins from the second set to be run on the system in response to the current inventory of applications obtained, and automatically running the plug-ins selected from the second set for performing the compliance check on the system in response to a scheduling criteria identified for the system, where the second set of plug-ins perform the compliance check for only the applications currently installed on the system. | 2010-03-18 |
20100071067 | PROGRAM FOR RESOURCE SECURITY IN A DATABASE MANAGEMENT SYSTEM - An inventive method is presented for resource security in a database management system having a plurality of resources, the method comprising creating a macro and a corresponding data section definition (DSECT) defining security for each resource, assembling all of the DSECTs into a load module, processing the load module to obtain source code, and assembling the source code, such that changing the source code of one resource modifies the defined security of the resource and adding new source code to the source code adds a new resource having security to the plurality of resources. The processing step can comprise loading the load module, reading a DSECT having a total number of resources, and, for each resource of the total number of resources, reading a next DSECT, finding the defined security in the next DSECT, and obtaining the source code associated with the defined security. | 2010-03-18 |
20100071068 | METHOD AND COMMUNICATION SYSTEM FOR THE COMPUTER-AIDED DETECTION AND IDENTIFICATION OF COPYRIGHTED CONTENTS - Disclosed is a method for the computer-aided detection and identification of copyrighted contents that are exchanged between at least two computers in a communication network, especially in peer-to-peer networks. Said method comprises the following steps: —first data packets that arc specified according to an execute command and are analyzed regarding at least one first criterion are fed to a first computer (PAT), first and second parameters being determined from the data packets meeting the at least one first criterion; —the first computer (PMT) determines the first data packets encompassing the second parameter from all first data packets that are fed to the first computer (PAT) and transmits said data packets to a second computer (FP); —a third computer (CRAW) sends at least one inquiry message for detecting data with copyrighted contents to the communication network, said third computer (CRAW) receives reply messages in reaction to the at least one inquiry message and requests second data packets meeting at least one second criterion from the communication network and analyzes the same, third and fourth parameters being determined from the data packets meeting the at least one second criterion; —the third computer (CRAW) determines the second data packets encompassing the fourth parameter from all second data packets that are fed to the third computer (CRAW) and transmits said data packets to the second computer (FP); —the first computer (PAT) transmits the first parameters to the third computer (CRAW) in order for said first parameters to be used in the second criteria; and—the computer (CRAW) transmits the third parameters to the second computer (PAT) in order for said third parameters to be used in the first criteria. | 2010-03-18 |
20100071069 | IMAGE FORMING APPARATUS, LICENSE DETERMINATION METHOD, AND COMPUTER-READABLE RECORDING MEDIUM THEREOF - An image forming apparatus capable of executing an application formed by a plurality of program modules is disclosed, including: a correspondence information storing part, a determination part, and a boot control part. A correspondence information storing part stores correspondence information corresponding to the plurality of program modules and a plurality of sets of license data for the application. A determination part determines whether to permit or deny activation based on the license data corresponded to the correspondence information for each of the program modules included in the application. A boot control part activates one or more program modules which are permitted to be activated by the determination part. | 2010-03-18 |
20100071070 | Managing Sharing of Media Content From a Server Computer to One or More of a Plurality of Client Computers Across the Computer Network - Improved techniques to manage or restrict sharing of media assets over a network are disclosed. A server computer having media assets can permit one or more clients to receive access to such media assets over a computer network. However, the access to such media assets can be restricted based on numerical limits as well as temporal limits. The media assets can, for example, be digital media assets, such as audio items (e.g., audio files, including music or songs), videos (e.g., movies) or images (e.g., photos). | 2010-03-18 |
20100071071 | SECURE MEDIA PATH SYSTEM AND METHOD - A secure media path system and method are provided herein. | 2010-03-18 |
20100071072 | SYSTEM AND METHOD FOR CONTROLLING ACCESS TO LICENSE PROTECTED ASSETS USING USING RFID TECHNOLOGY - Access to a license protected asset is limited by storing license information associated with the asset on at least one radio frequency identification (RFID) tag. Access to the asset is allowed only upon successful retrieval and verification of the license information by a device having at least one RFID reader. | 2010-03-18 |
20100071073 | TECHNIQUES FOR SHUFFLING VIDEO INFORMATION - An apparatus, system, method, and article for shuffling video information are described. The apparatus may include a media processing node to receive video information. The media processing node may include a shuffling module to shuffle the video information according to a shuffle order and a trusted entity programmed based on the shuffle order to provide access to the video information. The video information may be provided in an unshuffled manner when accessed through the trusted entity. Other embodiments are described and claimed. | 2010-03-18 |
20100071074 | APPARATUS FOR EXECUTING INTEROPERABLE DIGITAL RIGHTS MANAGEMENT USING CONTENTS DEVICE AND METHOD OF PERFORMING OPERATIONS BETWEEN CONTENTS DEVICE AND DIGITAL RIGHTS MANAGEMENT TOOL FOR INTEROPERABLE DIGITAL RIGHTS MANAGEMENT - Provided are an apparatus for executing interoperable digital rights management (DRM) using a contents device and a method of performing an operation between the contents device and a DRM tool for interoperable DRM, and more particularly, a method and apparatus for executing a DRM tool in various environments, regardless of the type of device or type of DRM tool, using an interfaced DRM executing apparatus including a DRM processor or a DRM tool agent. | 2010-03-18 |
20100071075 | Copying A Web Element With Reassigned Permissions - Disclosed herein is a computer implemented method and system for copying a web element with reassigned permissions. An element creator creates the web element in a first location in an online environment. The element creator assigns the permissions to one or more of multiple template users for the web element. The element creator defines a copy operation for the web element for a copying user. The definition comprises selecting one or more of the template users for the reassignment of the permissions. The copying user copies the web element to a second location in the online environment by performing the defined copy operation. The permissions of the selected template users are reassigned to the copying user for the copied web element. | 2010-03-18 |
20100071076 | SYSTEMS, METHODS, AND PROGRAM APPLICATIONS FOR SELECTIVELY RESTRICTING THE PLACESHIFTING OF COPY PROTECTED DIGITAL MEDIA CONTENT - Systems, methods, and program products are provided for selectively restricting the transmission of copy protected digital media content from a computer system, over a network, and to a remote display. In one embodiment, a method includes the steps of capturing digital media content rendered on the local display by a media player application executed by the computer system; determining whether the media player application is accessing copy protected digital media content; and, if the media player application is not accessing copy protected digital media content, converting the captured digital media content to a media stream and transmitting the media stream over a network for presentation on a remote display. | 2010-03-18 |
20100071077 | APPARATUS, SYSTEM, AND METHOD FOR DETECTING TAMPERING OF FISCAL PRINTERS - An apparatus, system, and method are disclosed for detecting tampering of devices such as fiscal printers. A memory module includes a volatile memory that stores multi-bit data. An operation module allows operation of an electronic device, such as a fiscal printer, in response to determining that the predefined multi-bit data is stored in the volatile memory. A detection module detects an attempt to access the enclosed device where access to the enclosed device is restricted by an enclosure. A tamper switch module disconnects power to the volatile memory such that the predefined multi-bit data stored in the volatile memory is erased in response to the detection module detecting an attempted access to the enclosed device. A shutdown module disables operation of the electronic device in response to determining that the predefined multi-bit data is not stored in the volatile memory. | 2010-03-18 |
20100071078 | RSPONDINS AS MODULATORS OF ANGIOGENESIS AND VASCULOGENESIS - The present invention relates to the use of Rspondins, particularly Rspondin2 (Rspo2) or Rspondin3 (Rspo3) or Rspondin nucleic acids, or regulators or effectors or modulators of Rspondin, e.g. Rspo2 and/or Rspo3 to promote or inhibit angiogenesis and/or vasculogenesis, respectively. The invention is based on the demonstration that Rspo3 and Rspo2 are angiogenesis promoters, and the identification of Rspo2 and 3 as positive regulators of vascular endothelial growth factor (VEGF). These results indicate a major role for Rspondins, particularly Rspo3 and/or Rspo2 in the signaling system during angiogenesis. The invention also relates to the use of regulators or effectors or modulators of Rspondin3, including agonists and antagonists, in the treatment of conditions where treatment involves inhibiting or promoting angiogenesis and/or vasculogenesis. | 2010-03-18 |
20100071079 | METHODS FOR TREATING AUTOIMMUNE AND CHRONIC INFLAMMATORY CONDITIONS USING ANTAGONISTS OF CD30 OR CD30L - The invention provides methods of treating autoimmune and chronic inflammatory conditions by administering agents that hinder the CD30/CD30L interaction, combination treatments, and methods of treating conditions resistant to treatment with TNFα inhibitors by administering agents that inhibit signal transduction by CD30 or IL-1. Included also are treatments involving concurrently administering agents that block the CD30/CD30L interaction and agents that antagonize the IL-4/IL-4R interaction. Additionally provided is an animal model for screening candidate agents for their efficacy in treating conditions that are resistant to treatment with TNFα inhibitors. | 2010-03-18 |
20100071080 | ANTIBODIES TO SULFATED CARBOHYDRATES - The present invention relates to antibodies and antigen-binding portions thereof that specifically bind to chondroitin sulfate, particularly CS-A, CS-C and CS-E tetrasaccharides. The present invention also relates to methods of making anti-CS antibodies, pharmaceutical compositions comprising these antibodies and methods of using the antibodies and compositions thereof for diagnosis and treatment. | 2010-03-18 |
20100071081 | METHOD FOR STIMULATING DENDRITIC CELLS AND CELL PRODUCT THUS OBTAINED FOR THE AUTOLOGOUS IMMUNOTHERAPY OF SOLID HUMAN TUMOURS - In the ex vivo stimulation method of dendritic cells, the stimulation occurs with the lysate of tumour spheres (TS) of the solid tumours. | 2010-03-18 |
20100071082 | Barley Cultivar Champion - A barley cultivar, designated Champion, is disclosed. The invention relates to the seeds of barley cultivar Champion, to the plants of barley Champion, and to methods for producing a barley plant produced by crossing barley cultivar Champion with itself or another barley variety. The invention also relates to methods for producing a barley plant containing in its genetic material one or more transgenes and to the transgenic barley plants and plant parts produced by those methods. The invention also relates to barley varieties or breeding varieties and plant parts derived from barley cultivar Champion, to methods for producing other barley varieties, lines or plant parts derived from barley cultivar Champion, and to the barley plants, varieties, and their parts derived from the use of those methods. The invention further relates to hybrid barley seeds and plants produced by crossing barley cultivar Champion with another barley cultivar. This invention further relates to methods for developing other barley varieties or breeding lines derived from variety Champion including cell and tissue culture, haploid systems, mutagenesis, and transgenic derived lines. | 2010-03-18 |
20100071083 | TEMPERATURE-DEPENDENT MEGANUCLEASE ACTIVITY - The invention relates to methods for the production of genetically modified plants using engineered meganucleases and elevated temperature and to genetically modified plants produced by such methods. | 2010-03-18 |
20100071084 | POTEXVIRUS-DERIVED REPLICON - Nucleic acid comprising or encoding an RNA replica comprising, in this order, the following segments (i) to (iii): i) a nucleic acid sequence encoding a potexvirus RNA-dependent RNA polymerase or a function-conservative variant thereof; ii) a nucleic acid sequence comprising: a) a potexvirus triple gene block or a function-conservative variant thereof and b) a sequence encoding a potexviral coat protein or a function-conservative variant thereof; or a sequence encoding a tobago viral movement protein; and iii) a heterologous nucleic acid sequence expressible from said replica in a plant or in plant tissue. | 2010-03-18 |
20100071085 | System for Expression of Genes in Plants from a Virus-Based Expression Vector - Modified expression vectors, including Tobacco Mosaic Virus (TMV) expression vectors, methods for modifying such vectors, and uses of the same are disclosed. | 2010-03-18 |
20100071086 | POLYSOME-MEDIATED CELL TYPE-, TISSUE TYPE- OR CONDITION-ENHANCED TRANSCRIPT PROFILING - In this invention, a method is described that allows for the efficient creation and identification of validated biological materials that greatly enhance the ability to perform polysome-mediated RNA profiling, such as constitutive, cell type-, tissue type-, or condition-enhanced RNA profiling. The method relies on the use of a tri-partite plant binary expression vector comprised of the following components: a) a DNA promoter element that drives expression of a sequence specific transcription activator protein such as a LexA:Gal4 fusion protein in a unique desired pattern, b) a DNA promoter element comprising a target site for the transcriptional activator protein, such as opLexA, fused to a nucleotide encoding an epitope tagged ribosomal component protein and c) a DNA promoter element comprising a target site for the transcriptional activator protein, such as opLexA, fused to a nucleotide encoding an in vivo reporter protein. By visualization of the co-regulated reporter, this method allows for in planta confirmation that the promoter element is driving expression, such as constitutive, cell type-, tissue type-, or condition-enhanced expression, of the tagged ribosomal protein in the desired cell or tissue types. | 2010-03-18 |
20100071087 | ENHANCED FLORAL SINK STRENGTH AND INCREASED STABILITY OF SEED SET IN PLANTS - The invention discloses a transgenic method for enhancing sink strength in female reproductive organs. It involves the temporal and spatial expression of genes affecting the starch and sucrose metabolic pathways in a plant organ or plant tissue. The invention also includes expression constructs, and methods for the production of crop plants with heritable phenotypes which are useful in breeding programs designed to increase yield potential over a range of environmental conditions. | 2010-03-18 |
20100071088 | Plant Expression Constructs and Methods of Utilizing Same - A Geminivirus based expression construct being capable of systemic symptomeless spread in a plant host is provided as well as methods of utilizing same for plant gene expression, gene silencing and plant protection. | 2010-03-18 |
20100071089 | Method For Increasing Pathogen Resistance In Transgenic Plants - The invention relates to a method of increasing the resistance to one or more penetrating pathogen(s) in a monocotyledonous or dicotyledonous plant or a part of a plant, for example in an organ, tissue, a cell or a part of a plant cell, for example in an organell, wherein a DNA sequence which codes for an armadillo repeat ARM1 protein and which mediates an increased pathogen resistance, preferably an increased resistance to fungal pathogens, is increased into, and expressed in, the plant or plant cell; or wherein an endogenous DNA sequence which codes for an armadillo repeat ARM1 protein and which mediates an increased pathogen resistance, preferably an increased resistance to fungal pathogens, is increased in the plant or plant cell in comparison with the original, or wild-type, plant, or wherein the endogenous gene sequence or preferably the 5′-untranslated region (5′UTR) is modified in comparison with the original sequence. The invention also relates to plants, to parts of a plant, for example an organ, tissue, a cell or a part of a plant cell, for example an organelle, which are obtained by the above methods, and to corresponding propagation material. | 2010-03-18 |
20100071090 | COMPOSITIONS AND METHODS FOR EXPRESSION OF A HETEROLOGOUS NUCLEOTIDE SEQUENCE IN PLANTS - The present invention provides compositions and methods for targeting polypeptides to the chloroplasts of higher plants. Compositions include expression cassettes having a nucleotide sequence encoding a chloroplast targeting peptide (CTP) operably linked to a nucleotide sequence of interest, wherein the CTP is derived from | 2010-03-18 |
20100071091 | NUCLEIC ACID SEQUENCES ENCODING PROTEINS ASSOCIATED WITH ABIOTIC STRESS RESPONSE AND PLANT CELLS AND PLANTS WITH INCREASED TOLERANCE TO ENVIRONMENTAL STRESS - This invention relates generally to nucleic acid sequences encoding proteins that are associated with abiotic stress responses and abiotic stress tolerance in plants. This invention further relates to transformed plant cells with altered metabolic activity compared to a corresponding non-transformed, wild-type plant cell, wherein the metabolic activity is altered by transformation with a Stress-Related Protein (SRP) coding nucleic acid and results in increased tolerance and/or resistance to an environmental stress as compared to a corresponding non-transformed, wild-type plant cell. | 2010-03-18 |
20100071092 | METHODS AND GENETIC CONSTRUCTS FOR MODIFICATION OF LIGNIN COMPOSITION OF CORN COBS - Expression cassettes causing specific regulatory control of transgene expression in plants, wherein the expression cassettes include regulatory sequences from the MADS gene family for expression of recombinant gene products in the reproductive tissue of plants for the purpose of generating maize plants with altered lignin content of the cobs. | 2010-03-18 |
20100071093 | Yield Increase in Plants Overexpressing the ACCDP Genes - A transgenic crop plant transformed by a 1-AminoCyclopropane-1-Carboxylate Deaminase-like Polypeptide (ACCDP) coding nucleic acid, wherein expression of the nucleic acid sequence in the crop plant results in the plant's increased root growth, and/or increased yield, and/or increased tolerance to environmental stress as compared to a wild type variety of the plant. Also provided are agricultural products, including seeds, produced by the transgenic crop plants. Also provided are isolated novel ACCDPs, and isolated novel nucleic acids encoding ACCDPs, and vectors and transgenic plant containing the same. | 2010-03-18 |
20100071094 | PROMOTER EXPRESSED IN THE DEHISCENCE ZONE OF DRY FRUITS - The invention relates to a promoter specific for cells of the dehiscence zone of dry fruits, and to the use of this promoter for specifically expressing a gene of interest in this dehiscence zone. | 2010-03-18 |
20100071095 | Method for Generating Plant Diversity By Incorporation of Microsatellite Sequences Into the Plant Genome - The present invention provides a method for the generation of genetically diverse plants via the incorporation of micro-satellite (MS) sequences into the planar genome. The method involves obtaining MS-like DNA fragment, introducing said DNA into plant cells, and selecting said cells for the incorporation of the DNA. Finally, plants are grown from the selected cells. Said plants display phenotypic variability, and are more diverse than the parental plant. Using the method herein presented, novel plant varieties are generated. | 2010-03-18 |
20100071096 | PLANT DISEASE AND INSECT DAMAGE CONTROL COMPOSITION AND PLANT DISEASE AND INSECT DAMAGE PREVENTION METHOD - The invention provides a plant disease and insect damage control composition including, as active ingredients, dinotefuran and at least one fungicidal compound; and a plant disease and insect damage prevention method that includes applying such a composition to a plant body, soil, plant seed, stored cereal, stored legume, stored fruit, stored vegetable, silage, stored flowering plant, or export/import timber. The invention provides a new plant disease and insect damage control composition and a plant disease and insect damage prevention method with very low toxicity to mammals and fishes, the composition and method showing an effect against plural pathogens and pest insects, including emerging resistant pathogens and resistant pest insect, by application to a plant body, soil, plant seed, stored cereal, stored legume, stored fruit, stored vegetable, silage, stored flowering plant, or export/import timber. | 2010-03-18 |
20100071097 | Nucleic Acid Molecules and Other Molecules Associated with the Methionine Synthesis and Degradation Pathways - The present invention is in the field of plant biochemistry. More specifically the invention relates to nucleic acid sequences from plant cells, in particular, DNA sequences from maize and soybean plants associated with the methionine pathway. The invention encompasses nucleic acid molecules that encode proteins and fragments of proteins. In addition, the invention also encompasses proteins and fragments of proteins so encoded and antibodies capable of binding these proteins or fragments. The invention also relates to methods of using the nucleic acid molecules, proteins and fragments of proteins and antibodies, for example for genome mapping, gene identification and analysis, plant breeding, preparation of constructs for use in plant gene expression and transgenic plants. | 2010-03-18 |
20100071098 | SCANNING PROBE EPITAXY - A dual tip probe for scanning probe epitaxy is disclosed. The dual tip probe includes first and second tips disposed on a cantilever arm. The first and second tips can be a reader tip and a synthesis tip, respectively. The dual tip probe further includes a rib disposed on the cantilever arm between the first and second tips. The dual tip probe can also include a strain gauge disposed along the length of the cantilever arm. | 2010-03-18 |
20100071099 | ATOMIC FORCE MICROSCOPE AND INTERACTION FORCE MEASUREMENT METHOD USING ATOMIC FORCE MICROSCOPE - A frequency shift Δf obtained by an FM-AFM can be expressed by a simple linear coupling of a Δf | 2010-03-18 |
20100071100 | Probes, Methods of Making Probes, and Applications using Probes - Provided herein are methods and apparatuses for analyzing molecules, particularly polymers, and molecular complexes with extended conformations. In particular, the methods and apparatuses are used to identify sequence information in molecules or molecular ensembles, which is subsequently used to determine structural information about the molecules. Further, provided herein are various methods of forming probes and films for making such probes of nanoscale dimension. | 2010-03-18 |
20100071101 | Japanese maple plant named 'King's Blood' - A new and distinct cultivar of Japanese Maple plant named ‘King's Blood’, characterized by its brilliant scarlet foliage and leaf stems (color “Chrysanthemum Crimson 824/0” as shown in The Royal Horticultural Society Color chart, 2007 edition). King's Blood substantially retains its unique color for three seasons and does not experience warm weather foliage tip burn off is typical in other Japanese Maples. | 2010-03-18 |
20100071102 | Plant variety: Hannyajisenred6106 - A new and distinct variety of | 2010-03-18 |
20100071103 | VERBENA PLANT NAMED 'RADVERB' - A new and distinct | 2010-03-18 |
20100071104 | Lomandra hystrix plant named 'LHBYF' - ‘LHBYF’ is a distinctive variety of | 2010-03-18 |
20100071105 | VARIETY OF CUPHEA PLANT NAMED 'VIEBURG' - A new and distinct | 2010-03-18 |