13th week of 2009 patent applcation highlights part 62 |
Patent application number | Title | Published |
20090083812 | Method and apparatus for controlling on-demand play of media files based on P2P protocols - The present invention is to provide a method and apparatus for control on-demand play of media files based on P2P protocols, and its core idea lies in that, the download of the control information piece where the file control information is located is assigned with the highest priority when the on-demand play of streaming media files is implemented; while the download of the control information piece where the file control information is located and the index information piece where the index information is located are assigned with the highest priority, when the on-demand play of non-streaming media files is implemented, thereby playing while downloading of media files based on the P2P protocols. | 2009-03-26 |
20090083813 | Video Delivery Module - Described herein are techniques, including methods and systems, including computer program products, for a video delivery module. A broadcast program and a video-on-demand program are ingested by a video delivery module. At least a portion of the broadcast program and at least a portion of the video-on-demand program are stored. The broadcast program, the video-on-demand program, or both are delivered as a unicast video stream to a first single subscriber through a multiplexer connected to a plurality of subscribers. | 2009-03-26 |
20090083814 | Apparatus and method for outputting video Imagrs, and purchasing system - The video input unit inputs video data. The reference data input unit inputs a plurality of reference data relating to the video data. The extraction condition determining unit determines, from the identification information of the plurality of reference data, an item of identification information in correspondence with a period of time elapsed after receipt of an output request. The reference data extracting unit extracts the reference data having the determined identification information. The analyzing unit calculates the level of similarity between the frames in the input video data and the reference data, and extracts frames whose level of similarity is greater than a first threshold value. The video generating unit generates output video data that includes the extracted frames. The output unit outputs the generated output video data. | 2009-03-26 |
20090083815 | GENERATING SYNCHRONIZED INTERACTIVE LINK MAPS LINKING TRACKED VIDEO OBJECTS TO OTHER MULTIMEDIA CONTENT IN REAL-TIME - The method, system and computer program product generate online interactive maps linking tracked objects (in a live or pre-recorded video sequence) to multimedia content in real time. Specifically, an object tracking and link generation (OTLG) utility allows a user to access multimedia content by clicking on moving (or still) objects within the frames of a video (or image) sequence. The OTLG utility identifies and stores a clear image(s) of an object or of multiple objects to be tracked and initiates a mechanism to track the identified objects over a sequence of video or image frames. The OTLG utility utilizes the results of the tracking mechanism to generate, for each video frame, an interactive map frame with interactive links placed in the map frame at a location corresponding to the object's tracked location in each video frame. | 2009-03-26 |
20090083816 | Systems and Methods for Time Shifting in Multiple Video Presentation - Systems and methods may provide for control of one or more feeds of a multi-feed channel. Such control may implement functions such as pausing, playing, rewinding, fast forwarding, slowing, replaying and zooming. The control may be selectively applied to the feeds so that one, selected ones or all of the feeds are controlled. Thus, implementations may allow a user to selectively interact with video feeds, as well as corresponding audio feeds, while viewing the multi-feed channel. | 2009-03-26 |
20090083817 | Method of Operating a Communication System and Communication System for Implementing Such a Method - A method of operating a communication system comprises a headend station and a plurality of end user stations which are connected to the headend station by means of a physical medium, and a system of one or a plurality of channels realised on this medium. There is an assignment mechanism for assigning a relevant channel to an end user station. More particularly, only a single channel is assigned to an end user station, each channel being assigned to a subset of zero, one or a plurality of end user stations. Controlled by the detection of a channel overload and/or end user dynamics, said assignment mechanism is activated to realise a new assignment of a plurality of channels while the condition is maintained that no more than a single channel is or remains assigned to each one of the end user stations. | 2009-03-26 |
20090083818 | SEARCHING CHANNEL PATH DISPLAY OF A VIDEO NETWORK - A device may provide for display equipment associated with a channel path of a video network, receive selection of one of the equipment, provide for display the selected equipment, receive selection of a port of the selected equipment, and provide for display other equipment of the video network connected to the selected port. | 2009-03-26 |
20090083819 | Optimization Of A Full Duplex Wideband Communications System - Systems and methods are disclosed for a full duplex wideband communications system for a local (e.g., in-home) coaxial network. The system employs a Frequency-division duplex (FDD) scheme that allows identical wideband modems to communicate with each other. To achieve this, the wideband modems contain a duplexer and a switch that allows reversing the connection of the wideband transmitter and receiver to the duplexer. Each wideband modem includes a control modem that is used to control access to the wideband channels. A wideband transmitter, which may be included in a modem associated with a server set-top terminal (STT), transmits a video presentation to a wideband receiver, which may be included in a modem associated with a client STT. | 2009-03-26 |
20090083820 | RE-TRANSMISSION OF TELEVISION CHANNELS OVER NETWORK - A method and system for re-transmitting television signals or other signals over a network. The re-transmission optionally being selected on dynamic basis according to demand for particular signals, wherein the re-transmitted signal may be changed as the demand for particular signals change. The signal demand may be determined from votes or other measures of subscriber inputs/desires. | 2009-03-26 |
20090083821 | Broadcast receiving apparatus - An appropriate direction and gain value of a smart antenna are efficiently searched for. The MPU | 2009-03-26 |
20090083822 | Transmitting Broadcast Signals In A Communication Network - In one embodiment, a facilitating signal broadcasting includes receiving a first copy of a signal at a first selector of a first headend, where the first copy is received through a first receive pipe of a first ring. A second copy of the signal is received at the first selector, where the second copy is received through a second receive pipe of a second ring. The first selector selects either the first copy or the second copy. The selected copy is sent through a first transmit pipe of the first ring. | 2009-03-26 |
20090083823 | ANTENNA SWITCH AND TUNER APPARATUS - An antenna switch including: a first input terminal that receives a terrestrial television broadcast signal as input; a second input terminal that receives a community antenna television broadcast signal as input; an output terminal that outputs the terrestrial television broadcast signal and the community antenna television broadcast signal; a signal selector switch that switches connection to either between the first input terminal and the output terminal or between the second input terminal and the output terminal in accordance with a switch select signal supplied from a predetermined control unit; and an amplifier that amplifies the terrestrial television broadcast signal and is interposed between the first input terminal and the signal selector switch. | 2009-03-26 |
20090083824 | FAVORITES MOSAIC - A set-top box generates a multimedia signal that includes streaming video for a plurality of currently available multimedia channels. A user configures a plurality of favorite channels. Streaming video from the favorite channels is provided in a plurality of viewports on a display. A user presses a favorites button on a remote control to prompt an application server to signal a content server to provide a compound video signal including streaming video from each favorite channel. The set-top box produces a resultant video signal including the streaming video from each favorite channel in a corresponding viewport. The viewports correspond to a mosaic template that may be hosted by the application server and accessed by the content server. | 2009-03-26 |
20090083825 | Activation systems and methods to initiate HDMI communication with mobile sources - Activation systems and methods initiate High-Definition Multimedia Interface (HDMI) communication between an HDMI source and an HDMI sink through an HDMI receptacle of the source. These systems and methods are especially suited for use with mobile sources that generally operate from a battery that cannot provide the +5V signal which the HDMI protocol requires sources to place on the +5V pin of their HDMI receptacles. These systems and methods automatically detect the insertion of an HDMI cable into the source's HDMI receptacle and subsequently generate and apply the required +5V signal to the +5V pin of the source's HDMI receptacle to initiate HDMI communication. Because they are directed to use in mobile sources, the embodiments are configured to minimize current drain. | 2009-03-26 |
20090083826 | UNSOLICITED COMMUNICATION MANAGEMENT VIA MOBILE DEVICE - A system that can effectively screen or filter incoming communications to a mobile device is disclosed. The innovation can filter voice calls, emails, instant messages, text messages, etc. via a mobile device (e.g., cellular telephone, smartphone, personal digital assistant (PDA), notebook computer). In accordance with the innovation, callers (or senders) are prompted to prove their ‘identity’ as an acceptable (or authorized) identity in order to be permitted to communicate with a mobile device. Accordingly, the innovation prompts a caller (or sender) with a challenge that requires a human input (e.g., human interactive programming (HIP)), which can effectively filter automated machine communication as well as unwanted human communication such as spam. This filtering can be based on most any policy, rule, context-awareness factor. | 2009-03-26 |
20090083827 | SYSTEM AND METHOD FOR CIRCUMVENTING INSTANT MESSAGING DO-NOT-DISTURB - A system and method for circumventing a do-not-disturb status of an instant messaging user including defining a policy of circumvention rights for circumventing do-not-disturb status in instant messaging. A do-not-disturb status of an instant messaging user is identified, and the do-not-disturb status of the instant messaging user is circumvented based upon the policy of circumvention rights. | 2009-03-26 |
20090083828 | METHOD OF ARMING-DISARMING SECURITY PANEL OVER UN-ENCRYPTED COMMUNICATION PATHS - A method and system for remotely controlling a security panel of a security alarm system over un-encrypted communication paths are provided. In one aspect, a message is received in plain text over un-encrypted communication path, for example, from a remote device to control a security panel of a security system installed at a premise. The plain text message is correlated to a security panel command and the security panel command is sent to a security panel installed at the premise. The security panel executes the command and sends a confirmation status message. The status message is correlated to a second plain text message and communicated over the un-encrypted communication path to the remote device that initiated the command. | 2009-03-26 |
20090083829 | COMPUTER SYSTEM - The present invention is directed to computer systems, methods and/or hardware where one or more guest operating systems exchange instructions with the processing hardware (see DEFINITIONS section) through a controller kernel. Even though the instructions are exchanged through the controller kernel, rather than directly between the OS and the processing hardware, the controller kernel does not change the instructions out of native form. The controller kernel refrains from virtualizing or emulating the instructions. For this reason, the controller kernel cannot be considered to be and/or include middleware, a hypervisor or VMM. The use of the controller kernel can be helpful in computer systems with multiple guest OS's because it allows multiple containerized OS's to simultaneously run on a single set of processing hardware. For example, the multiple containerized OS's can be used to run multiple terminals. The use of the controller kernel may also be useful even if there is a single guest operating system. For example, a LINUX controller kernel has been found to speed up the operation of the Windows Vista operating system running as the guest OS, relative to the speed of Windows Vista running directly on the same processing hardware in the conventional way. | 2009-03-26 |
20090083830 | Systems and Methods of Controlling Network Access - A new approach to network security includes manipulating an access point such that an initial communication from an external device is passed to a restricted subset of a computing network including a gatekeeper. The gatekeeper is configured to enforce a security policy against the external device before granting access to a less-restricted subset of the computing network. If requirements of the security policy are satisfied, then the gatekeeper reconfigures the access point such that further communication from the external device may be received by elements of the less-restricted subset. Enforcement of the security policy optionally includes performing a security audit of the external device. | 2009-03-26 |
20090083831 | ACCESS CONTROL DECISION SYSTEM, ACCESS CONTROL ENFORCING SYSTEM, AND SECURITY POLICY - In an access control decision system, first information indicated by an access decision request is converted into second information being higher abstract when the access decision request is received. Next, the access control for the subject information is determined by referring a security policy being abstractly regulated based on the second information and a decision result showing the access control for the subject information is sent to a request originator that sent the access decision request. | 2009-03-26 |
20090083832 | Modal and linear techniques for access control logic - Access control logic may use logical constructs such as “says” and “speaks for”, and may be translated to modal logic. The modal logic may be used to determine the truth or falsehood of formulas in access control logic, which may be used in access control decisions. The modal logic may be S | 2009-03-26 |
20090083833 | AUTHENTICATION WITH PHYSICAL UNCLONABLE FUNCTIONS - Physical Unclonable Functions (PUFs) for authentication can be implemented in a variety of electronic devices including FPGAs, RFIDs, and ASICs. In some implementations, challenge-response pairs corresponding to individual PUFs can be enrolled and used to determine authentication data, which may be managed in a database. Later when a target object with a PUF is intended to be authenticated a set (or subset) of challenges are applied to each PUF device to authenticate it and thus distinguish it from others. In some examples, authentication is achieved without requiring complex cryptography circuitry implemented on the device. Furthermore, an authentication station does not necessarily have to be in communication with an authority holding the authentication data when a particular device is to be authenticated. | 2009-03-26 |
20090083834 | ACCESSORY AUTHENTICATION FOR ELECTRONIC DEVICES - Improved techniques to control utilization of accessory devices with electronic devices are disclosed. The improved techniques can use cryptographic approaches to authenticate electronic devices, namely, electronic devices that interconnect and communicate with one another. One aspect pertains to techniques for authenticating an electronic device, such as an accessory device. Another aspect pertains to provisioning software features (e.g., functions) by or for an electronic device (e.g., a host device). Different electronic devices can, for example, be provisioned differently depending on different degrees or levels of authentication, or depending on manufacturer or product basis. Still another aspect pertains to using an accessory (or adapter) to convert a peripheral device (e.g., USB device) into a host device (e.g., USB host). The improved techniques are particularly well suited for electronic devices, such as media devices, that can receive accessory devices. One example of a media device is a media player, such as a hand-held media player (e.g., music player), that can present (e.g., play) media items (or media assets). | 2009-03-26 |
20090083835 | NETWORK ACCESS CONTROL - An system for controlling access to a network by a user device. The system includes a criteria engine that generates a plurality of criteria to be monitored on the user device and a checker that generates at least one check for each of the plurality of criteria. The system further includes a profiler that retrieves a profile for the user device, the profile including the plurality of criteria and the at least one check for each of the plurality of criteria, a comparator that compares a summary of the retrieved profile to a summary of a profile received from the user device and a communicator that communicates a message to the user device based on the comparison. | 2009-03-26 |
20090083836 | PREVENTING A NON-HEAD END BASED SERVICE PROVIDER FROM SENDING MEDIA TO A MEDIA PROCESSING SYSTEM - Systems and methods that prevent unauthorized access in a communications network are provided. In one embodiment, a system that prevents unauthorized access to a network device may include, for example, a network device and a headend. The headend may be coupled to a communications network. The network device may be deployed in a home environment and may be communicatively coupled to the communications network via the headend. The headend may be adapted, for example, to determine whether a request to access the network device is authorized. | 2009-03-26 |
20090083837 | STORAGE CONTROLLER FOR CONTROLLING ACCESS BASED ON LOCATION OF CONTROLLER - Provided is a controller in a computer system, the computer system including a plurality of data storage systems, and at least one controller for controlling access to data stored in the plurality of data storage systems, the each controller including: an interface coupled to the network; a processor coupled to the interface; and a storage unit coupled to the processor, in which: the storage unit holds attribute information indicating whether to permit access to the data; and the processor is configured to: receive a writing request of the data from a client computer coupled to the network; judge whether each of the each controller permits the requested writing based on the held attribute information and information of a location where the each controller is installed; and write the data in a data storage system controlled by a controller judged to permit the writing. | 2009-03-26 |
20090083838 | Method and System For Assuring Security of a Transaction in a Telecommunicaiton Network - The invention relates to a method for a beneficiary to acquire a right to use a digital content in a contents distribution system comprising a commercial server ( | 2009-03-26 |
20090083839 | Fingerprint system and method for access control - A fingerprint method for access control includes the steps of: providing an application server ( | 2009-03-26 |
20090083840 | INFERENCE SEARCH ENGINE SECURITY - In some aspects of the invention, a method for determining access to data stored within one or more databases is described. The method includes the aspects of receiving a user request from a user at an inference engine for access to the data, wherein the inference engine is in communication with a rules database, including one or more rules governing access rights to the data. Moreover, the method includes the aspects of creating a user credential based on the application of one or more of the rules to a identity information related to the user. Further, the method includes the aspects of comparing the created user credential and the user request at the one or more databases to determine whether the user meets the access rights for retrieving the data. Furthermore, the method includes aspects of determining an answer as to whether the access of the data is permitted or denied. | 2009-03-26 |
20090083841 | Apparatus and method for performing hosted and secure identity authentication using biometric voice verification over a digital network medium - Apparatus, methods, and machine-readable articles of manufacture enable a means of performing vocal tract based authentication and vocal tract based enrollment via the Internet or similar computing network as a communication medium. A protocol and process is outlined which enables Internet or similar network based authentication among three parties; a party wishing to prove a claimed identity, a party requesting to authenticate the claimed identity, and a party performing the authentication or enrollment process. Further, the party requesting authentication is a separate entity from the party performing authentication or enrollment. In such an arrangement, the party performing the authentication or enrollment is termed “hosted” or “software as a service”. The protocol and process is suitable for execution by distinct software components installed and running on computers located at the location of each of the three parties. | 2009-03-26 |
20090083842 | SECURE DETECTION NETWORK SYSTEM - A secure detection network system includes plurality of remote nodes, each remote node comprising a set of detector interfaces configured to couple to a set of detectors disposed to detect the presence of an illegal asset within a shipping container; at least one server node configured to initialize, install, and authenticate each remote node in the plurality of remote nodes, including delivering to each remote node an agent module, said agent module for each remote node comprising a node specific configuration file defining a set of nodes with which the remote node can communicate and a different encryption means corresponding to each node in the set of nodes; and a communication path coupling the plurality of remote nodes and the at least one server node. | 2009-03-26 |
20090083843 | UNIQUE IDENTIFICATION OF ENTITIES OF AN INDUSTRIAL CONTROL SYSTEM - Systems and methods are provided for issuing unique identification credentials to a plurality of devices, and their constituent components, in an industrial control system. Identification credentials are granted by an identification authority and conveyed to each of the credentialed devices and/or component through an identity token. The identification credentials include (1) a unique device identifier, (2) an identification authority component identifier, and (3) an indication of the location of the identification authority component. To secure the issued credentials, such credentials are encrypted and the identification token can be embedded with biometrics features. Identification credentials provide for the following prominent features: (i) Secure access to a device form a client and (ii) determination a topology of a set of credentialed devices in an industrial control system. The topology is network agnostic and facilitates organizational modeling of processes in the industrial control system. | 2009-03-26 |
20090083844 | Synchronizing between host and management co-processor for network access control - In network access controlled networks, it is desirable to prevent access to the network by any non-authenticated entities. Access control may be established through a trusted agent that, in some embodiments, may be implemented with a management co-processor. In some cases, active management technology may establish a connection while a host is inactive. Then, after the host becomes active, the host can attempt to use the management co-processor connection without obtaining the necessary authentications. This may be prevented, in some embodiments, by scanning for an active host and, if such an active host is found, blocking the host from using a layer 2 authentication channel unless the host is properly authenticated and has a proper Internet Protocol address. | 2009-03-26 |
20090083845 | NETWORK FIREWALL TEST METHODS AND APPARATUS - A test method for Internet-Protocol packet networks that verifies the proper functioning of a dynamic pinhole filtering implementation as well as quantifying network vulnerability statistically, as pinholes are opened and closed is described. Specific potential security vulnerabilities that may be addressed through testing include: 1) excessive delay in opening pinholes, resulting in an unintentional denial of service; 2) excessive delay in closing pinholes, creating a closing delay window of vulnerability; 3) measurement of the length of various windows of vulnerability; 4) setting a threshold on a window of vulnerability such that it triggers an alert when a predetermined value is exceeded; 5) determination of incorrectly allocated pinholes, resulting in a denial of service; 6) determining the opening of extraneous pinhole/IP address combinations through a firewall which increase the network vulnerability through unrecognized backdoors; and 7) determining the inability to correlate call state information with dynamically established rules in the firewall. | 2009-03-26 |
20090083846 | SYSTEM AND METHOD FOR SECURITY MANAGEMENT OF HOME NETWORK - A security management system of a home network is provided. The home network includes a home gateway and one or more user devices connected to the home gateway. The security management system further includes a security management server adapted to provide a security management service for the home network. Within the home network, a security management module is disposed to provide a security service for the user devices within the home network. The user devices and a device where the security management module locates have unique device identifications, and the home network has a unique network identification. By the home gateway, the security management server communicates with the security management module. With the network identification and the device identification, the security management server and the security management module achieve a security management for the home network through a registration of the home network and a registration of the user device. A security management method of home network devices is also provided. | 2009-03-26 |
20090083847 | EMBEDDED AUTHENTICATION SYSTEMS IN AN ELECTRONIC DEVICE - This invention is directed to an electronic device with an embedded authentication system for restricting access to device resources. The authentication system may include one or more sensors operative to detect biometric information of a user. The sensors may be positioned in the device such that the sensors may detect appropriate biometric information as the user operates the device, without requiring the user to perform a step for providing the biometric information (e.g., embedding a fingerprint sensor in an input mechanism instead of providing a fingerprint sensor in a separate part of the device housing). In some embodiments, the authentication system may be operative to detect a visual or temporal pattern of inputs to authenticate a user. In response to authenticating, a user may access restricted files, applications (e.g., applications purchased by the user), or settings (e.g., application settings such as contacts or saved game profile). | 2009-03-26 |
20090083848 | PRINTING METHOD - A method and apparatus for printing a data item. The method comprises receiving at a printer a first component of said data item from an external data source; generating a second component of said data item at said printer; and printing said data item by printing said first and second components. | 2009-03-26 |
20090083849 | SECURITY PROTECTION METHOD AND PORTABLE ELECTRONIC DEVICE USING SAME - A security protection method used in a portable electronic device is provided. The portable electronic device provides an ID table for recording IDs of external electronic devices that are allowed to access the portable electronic device. The method includes: obtaining an ID of an external electronic device when the external electronic device is connected to the portable electronic device; determining whether the obtained ID exists in the ID table; and allowing the connected external electronic device to access the portable electronic device when the obtained ID exists in the ID table. A portable electronic device used the method is also provided. | 2009-03-26 |
20090083850 | EMBEDDED AUTHENTICATION SYSTEMS IN AN ELECTRONIC DEVICE - This invention is directed to an electronic device with an embedded authentication system for restricting access to device resources. The authentication system may include one or more sensors operative to detect biometric information of a user. The sensors may be positioned in the device such that the sensors may detect appropriate biometric information as the user operates the device, without requiring the user to perform a step for providing the biometric information (e.g., embedding a fingerprint sensor in an input mechanism instead of providing a fingerprint sensor in a separate part of the device housing). In some embodiments, the authentication system may be operative to detect a visual or temporal pattern of inputs to authenticate a user. In response to authenticating, a user may access restricted files, applications (e.g., applications purchased by the user), or settings (e.g., application settings such as contacts or saved game profile). | 2009-03-26 |
20090083851 | SERIALIZED LOCK COMBINATION RETRIEVAL SYSTEMS AND METHODS - Disclosed are embodiments of systems and methods for retrieving combination lock codes in a secure environment. In some embodiments, each of a plurality of combination locks are linked with a serial code. A user may then enter user identity information into a retrieval system. After the system has validated the user identity information, the user may enter a serial code into the system, the serial code associated with a combination lock for which the user would like to retrieve a corresponding combination code. Upon receipt of the serial code from the user, the system may securely transmit a combination code associated with the desired combination lock to the user. In one embodiment, the secure transmission of the combination code is done by sending an electronic mail message to an electronic mail account of the user. | 2009-03-26 |
20090083852 | Whitelist and Blacklist Identification Data - Aspects of the subject matter described herein relate to identifying good files and malware based on whitelists and blacklists. In aspects, a node starts a scan of files on a data store. In conjunction with starting the scan, the node creates a data structure that indicates the directories on the data store. The node sends the data structure to a whitelist server and a blacklist server and an indication of a last successful time of communication. The whitelist and blacklist servers respond to the node with information about any new files that have been added to the directories since the last successful communication. The node may subsequently use the information to identify known good files and malware. | 2009-03-26 |
20090083853 | METHOD AND SYSTEM PROVIDING EXTENDED AND END-TO-END DATA INTEGRITY THROUGH DATABASE AND OTHER SYSTEM LAYERS - Providing extended or end-to-end data integrity through layers of a system. In one aspect, information is to be transmitted between an application end of the system and a physical storage medium that stores the information for a database of the system, the information to be transmitted via a database server in a database server layer of the system. At least a portion of data protection is provided for the information, the data protection causing the information to be protected from corruption between a system layer and the physical storage medium, where the system layer is a separate layer provided closer to the application end of the system than the database server layer. | 2009-03-26 |
20090083854 | Syntax-Based Security Analysis Using Dynamically Generated Test Cases - A security analysis methodology is used to analyze the security of a device-under-analysis (DUA) with respect to a particular protocol message exchange. First, the mutation points that exist in the message exchange are determined. Then, the message exchange is executed multiple times—once for each mutation point. Each execution applies the mutation associated with that particular mutation point (e.g., a particular message during the exchange is modified in a particular way) to create a mutated message exchange. In other words, each message exchange with an applied mutation point corresponds to a test case. | 2009-03-26 |
20090083855 | System and methods for detecting intrusions in a computer system by monitoring operating system registry accesses - A method for detecting intrusions in the operation of a computer system is disclosed which comprises gathering features from records of normal processes that access the files system of the computer, such as the Windows registry, and generating a probabilistic model of normal computer system usage based on occurrences of said features. The features of a record of a process that accesses the Windows registry are analyzed to determine whether said access to the Windows registry is an anomaly. A system is disclosed, comprising a registry auditing module configured to gather records regarding processes that access the Windows registry; a model generator configured to generate a probabilistic model of normal computer system usage based on records of a plurality of processes that access the Windows registry and that are indicative of normal computer system usage; and a model comparator configured to determine whether the access of the Windows registry is an anomaly. | 2009-03-26 |
20090083856 | APPARATUS AND METHOD FOR PLAYBACK OF DIGITAL CONTENT - There is provided with a digital content playback apparatus which generates new digital content by replacing a content part in digital content by an other content parts, including: a storage to store license conditions defined for the content parts in the digital content, each of which includes at least a replacement permission condition and a replacement target specification condition, a specifying unit configured to allow a user to specify a replacement source content part as a content part to be replaced, and a replacement target content part as a content part for adding to the digital content for replacing the replacement source content part, and a verifying unit to verify whether license conditions of content parts in the digital content and the replacement target content part would be satisfied when replacing the replacement source content part in the digital content by the replacement target content part. | 2009-03-26 |
20090083857 | DIGITAL RIGHT MANAGEMENT SYSTEM, CONTENT SERVER, AND MOBILE TERMINAL - A digital rights management system ( | 2009-03-26 |
20090083858 | METHOD OF PROTECTING A PASSWORD FROM UNAUTHORIZED ACCESS AND DATA PROCESSING UNIT - A method of protecting a password from unauthorized access and a data processing unit are provided. An embodiment of the method of protecting a password from unauthorized access comprises storing data representing at least a portion of a password in a memory, assigning the data to at least one of a plurality of instructions, storing the plurality of instructions as processor executable code in the memory, and preventing read-out of the processor executable code as data from the memory. | 2009-03-26 |
20090083859 | PROGRESS INDICATORS TO ENCOURAGE MORE SECURE BEHAVIORS - A method for enticing users to behave securely in a computing environment. For security related input, such as selection of password, a progress indicator is provided to the user. The progress indicator correlates to the level of security obtained by the user's entry, rather than to the completion of the task. The indicator follows a non-linear function that crosses zero security and maximum expected security for the task. The function starts at shallow slope, increases towards the middle, and then reverts to shallow slop towards the end of the task. | 2009-03-26 |
20090083860 | Security system for a browser-based environment - Various technologies and techniques are disclosed for enhancing security in a browser-based environment. A first browser application hosts one or more other applications. The first browser application is operable to load the one or more other applications on one or more separate domains than a host domain, using one or more cookies as a communication method between the first browser application and the one or more other applications. Input is received from a user to access a first browser application on a first domain. A selection is received from the user to run a second browser application from within the first browser application. A first cookie is created in a second domain, with the first cookie containing information to be used by the second browser application. The second browser application is loaded on the second domain. For example, the first browser application can be a browser-based software development application. | 2009-03-26 |
20090083861 | Systems and Methods for Server Load Balancing Using Authentication, Authorization, and Accounting Protocols - Systems and methods for dynamically load-balancing clients across available servers without the need for a load balancer in front of a network are provided. Exemplary methods assign servers to clients in wireless and wireline networks based on server load. Methods and systems for using the authentication, authorization, and accounting (AAA) protocols to load-balance network servers are provided. The load-balancing systems and methods further include using the Diameter AAA protocol routing attribute value pairs (AVPs) to implement bootstrap functionality and load balancing. Methods and systems using the Diameter protocol to manage client assignments are disclosed. Methods and systems for dynamically load-balancing clients across available servers using an AAA protocol are further described. Methods and systems to redirect clients to available servers with the least load are disclosed. | 2009-03-26 |
20090083862 | PROVIDING SECURE INPUT TO A SYSTEM WITH A HIGH-ASSURANCE EXECUTION ENVIROMENT - Methods for maintaining the security of a secured execution environment on a system comprising said secured execution environment and a second execution environment are disclosed. A maintained current state for the secured execution environment is selected from among a group of possible states including a standard input mode state and a nexus input mode state. A flow of user input is directed according to the current state through a secure kernel of both the second environment and the secured execution environment. | 2009-03-26 |
20090083863 | p300 transgenic animal - The present invention relates to a transgenic animal wherein DNA encoding p300 and a promoter exerting its activity in myocardial cells are introduced, and a screening method using the same. | 2009-03-26 |
20090083864 | White hair development model animal, method for establishing white hair development model animal, method for passage of white hair development model animal, method for study on white hair development-control means, and composition for control of white hair development - A model animal causing the white hair development as a non-human mammalian animal with a phenotype such that the color of the hair first growing after birth is black or almost black and the model animal then causes the spontaneous white hair development following aging, where (1) the activated RET gene is genetically inserted in a hetero form and (2) the endothelin receptor B (Ednrb) gene is deficient in a hetero form, or the Ednrb gene is deficient in the homo form or in a hetero form and the Ednrb gene is genetically inserted in the homo form or in a hetero form under the DbH promoter. | 2009-03-26 |
20090083865 | Transgenic Mouse Lines Expressing Human Ace2 and Uses Thereof - Animal models for severe acute respiratory syndrome-coronavirus infection of humans are needed to elucidate SARS pathogenesis and develop vaccines and antivirals. Transgenic mice were developed expressing human angiotensin-converting enzyme 2, a functional receptor for the virus, under the regulation of a global promoter. A transgenic lineage, designated AC70, was among the best characterized against SARS coronavirus infection, showing weight loss and other clinical manifestations before reaching 100% mortality within 8 days after intranasal infection. Inflammatory mediators were also detected in these tissues, coinciding with high levels of virus replication. In contrast, infected transgene-negative mice survived without showing any clinical illness. The severity of the disease developed in these transgenic mice, AC70 in particular, makes these mouse models valuable not only for evaluating the efficacy of antivirals and vaccines, but also for studying SARS coronavirus pathogenesis and infection by other coronaviruses utilizing human ACE2 for viral entry into cells. | 2009-03-26 |
20090083866 | TRANSGENIC ROSA26-LUCIFERASE MICE FOR BIOLUMINESCENT IMAGING - The invention relates to non-human transgenic animals expressing bioluminescent markers | 2009-03-26 |
20090083867 | Use of Antagonists of Cxcl13 or Cxcr5 for Treating Wounds of Fibrotic Diseases - The invention provides the use of an antagonist of CXCL 13 or CXCR5 activity in the preparation of a medicament for the prevention and/or inhibition of pathological scarring; as well as the use of such antagonists in the preparation of a medicament for the prevention and/or inhibition of fibrotic disorders; and the use of such antagonists in the preparation of a medicament for the prevention and/or treatment of a chronic wound. Medicaments or methods of the invention are particularly suitable for use in keloids or venous ulcers. Suitable antagonists of CXCL13 or CXCR5 activity may be any compound capable of inhibiting the CXCL13/CXCR5 signalling pathway. The invention also provides a model of aberrant wound healing, which may lead to pathological scar formation, or to chronic wound formation. | 2009-03-26 |
20090083868 | Increasing lifespan by modulation of WWP-1 and UBC-18 - Ubiquitin ligase wwp-1 and ubiquitin conjugating enzyme ubc-18 are identified in nematodes as mediators of dietary restriction induced longevity and therefore as targets for modulation of lifespan in animals. Methods of screening for compounds that modulate longevity by assaying wwp-1 ubiquitination pathway parameters are provided, as are related systems. In addition, methods of using wwp-1 and/or ubc-18 to modulate longevity or delay onset of age-related diseases are described. | 2009-03-26 |
20090083869 | METHODS AND COMPOSITIONS FOR IDENTIFYING AGENTS THAT INHIBIT AN NS4B-MEDIATED NEOPLASTIC CELLULAR PHENOTYPE OF HCV INFECTED CELLS - The disclosure provides methods and compositions for identifying agents that inhibit a neoplastic cellular phenotype mediated by the NS4B protein nucleotide binding motif (NBM) of hepatitis C virus (HCV). In general, the methods involve contacting a candidate agent with a mammalian cell expressing an NS4B NBM polypeptide of an HCV virus, wherein expression of the NS4B NBM polypeptide in the absence of candidate agent promotes a neoplastic cellular phenotype, and detecting the presence or absence of an effect of said candidate agent on NS4B-mediated promotion of a neoplastic cellular phenotype. The disclosed methods and compositions find use in a variety of therapeutic and screening applications. | 2009-03-26 |
20090083870 | Systems for gene targeting and producing stable genomic transgene insertions - The novel germ-line transformation systems disclosed in this patent application allow the physical deletion of transposon DNA following the transformation process, and the targeting of transgene integrations into predefined target sites. In this way, transposase-mediated mobilization of genes-of-interest is excluded mechanistically and random genomic integrations eliminated. In contrast to conventional germ-line transformation technology, our systems provide enhanced stability to the transgene insertion. Furthermore, DNA sequences required for the transgene modification (e.g. transformation marker genes, transposase or recombinase target sites), are largely removed from the genome after the final transgene insertion, thereby eliminating the possibility for instability generated by these processes. The RMCE technology, which is disclosed in this patent application for invertebrate organisms (exemplified in | 2009-03-26 |
20090083871 | Targeting constructs for the functional disruption of avian immunoglobulin genes - A transgenic chicken is disclosed having disrupted endogenous immunoglobulin production. In one embodiment, a targeting construct is stably integrated into the genome of the chicken by homologous recombination in embryonic stem cells, and injection of the engineered embryonic stem cells into recipient embryos, thereby knocking out the endogenous immunoglobulin gene locus in resulting animals. The targeted disruption of the locus in embryonic stem cells is particularly useful in combination with the insertion of genetic elements encoding exogenous immunoglobulin molecules. After these chickens are cross-bred, a line of chickens is produced that has a reduction of endogenous immunoglobulin molecule production. | 2009-03-26 |
20090083872 | Production of Proteins in Eggs - Methods for preparing recombinant proteins, such as antibodies, in eggs are described. The method offers advantages over existing systems for preparing recombinant proteins including high yield, low cost and compatibility with animal protection regulations. In addition, since eggs are edible food sources the recombinant protein does not have to be isolated from the egg. | 2009-03-26 |
20090083873 | SEQUENCE-SPECIFIC INHIBITION OF SMALL RNA FUNCTION - The present invention relates to the discovery of a method for inhibiting RNA silencing in a target sequence-specific manner. RNA silencing requires a set of conserved cellular factors to suppress expression of gene-encoded polypeptide. The invention provides compositions for sequence-specific inactivation of the RISC component of the RNA silencing pathway, and methods of use thereof. The RISC inactivators of the present invention enable a variety of methods for identifying and characterizing miRNAs and siRNAs, RISC-associated factors, and agents capable of modulating RNA silencing. Therapeutic methods and compositions incorporating RISC inactivators and therapeutic agents identified through use of RISC inactivators are also featured. | 2009-03-26 |
20090083874 | PRODUCTION OF PROANTHOCYANIDINS TO IMPROVE FORAGE QUALITY - The invention provides method and compositions for the modulation of anthocyanin and proanthocyanidin production in plants. The methods of the invention allow creation of plants having novel phenotypes. Increased expression of anthocyanins and proanthocyanidins in plants may be used to increase the nutritional value of food plants for both human and animal consumption. Increased proanthocyanidin content also reduces the potential for bloat in animals fed certain forage plants low in condensed tannin content. The invention may also be used to modify plant pigmentation, and for nutraceutical and food colorant production. | 2009-03-26 |
20090083875 | Gerbera with leafy flower stem trait and in bud shipping trait - New, distinct and stable | 2009-03-26 |
20090083876 | Methods of affecting nitrogen assimilation in plants - Provided herein are compositions and methods for producing transgenic plants. In specific embodiments, transgenic plants comprise a construct comprising a polynucleotide encoding CCA1, GLK1 or bZIP1, operably linked to a plant-specific promote, wherein the CCA1, GLK1 or bZIP1 is ectopically overexpressed in the transgenic plants, and wherein the promoter is optionally a constitutive or inducible promoter. In other embodiments, transgenic plants in which express a lower level of CCA1, GLK1 or bZIP1 are provided. Also provided herein are commercial products (e.g., pulp, paper, paper products, or lumber) derived from the transgenic plants (e.g., transgenic trees) produced using the methods provided herein. | 2009-03-26 |
20090083877 | Transcription Factors, DNA and Methods for Introduction of Value-Added Seed Traits and Stress Tolerance - Abscisic acid-inducible gene expression in different plant tissues is enhanced synergistically by the co-expression of a B3-domain transcription factor and various bZIP-domain transcription factors, or a different B3-domain transcription factor. Using these transcription factors in novel formulations, as shown by examples, will confer value-added traits to transgenic plants, including, but not limited to, higher levels of heterologous gene expression, drought and salt tolerance, viability and productivity under stress, and enhanced nutrient reserves and seed properties. | 2009-03-26 |
20090083878 | Biological Containment System - The invention relates to materials and methods useful for controlling the unwanted spread of transgenic traits. The methods involve an apomictic plant containing a transgene for a desired trait and a transgene causing seed infertility. The methods also involve one or more transcription activators that activates expression of both transgenes carried by the apomictic plant. The transcription activator(s) activates expression of both transgenes in the female. Seeds that are formed on such plants are infertile. | 2009-03-26 |
20090083879 | Brittle Stalk 2 Gene Family And Related Methods And Uses - This invention relates to isolated polynucleotides encoding BRITTLE STALK 2-like (Bk2L) family polypeptides. The invention also relates to the construction of a chimeric gene encoding all or a portion of a Bk2L polypeptide, in sense or antisense orientation, wherein expression of the chimeric gene results in production of altered levels of the Bk2L polypeptide in a transformed host cell. | 2009-03-26 |
20090083880 | MODIFIED PLANT DEFENSIN - The invention herein includes a general method for reducing or eliminating a toxic effect of transgenic defensin expression in a host plant. The invention also includes a method of modifying a nucleic acid encoding a defensin, a nucleic acid modified thereby and a modified defensin encoded by the modified nucleic acid sequence. The invention also includes a transgenic plant containing and expressing the modified defensin-coding nucleic acid sequence, the plant exhibiting reduced or eliminated toxic effects of defensin, compared with otherwise comparable transgenic plants expressing an unmodified defensin. The modified defensin is termed a chimeric defensin having a mature defensin domain of a first plant defensin combined with a C-terminal propeptide domain of a second plant defensin or a vacuolar translocation peptide. | 2009-03-26 |
20090083881 | METHOD FOR PREVENTING MUTATION OF PATHOGENS EXPOSED TO TRANSGENIC PLANTS - A method for preventing mutation of pathogens or pest insects due to exposure to genetically-modified or transgenic plants, comprising: (a) introducing separately a plurality of resistance genes conferring pest and disease resistance to a given recipient plant variety or combinations of the varieties to form a plurality of transgenic plant lines each harboring different resistance genes; (b) multiplying the transgenic plant lines separately to obtain separate transgenic plant lines; and (c) mixing seeds of the separate transgenic plant lines in a specific weight ratio to form a final transgenic product. Additionally, small number of seeds of the non-transformed plants is incorporated in the transgenic plant lines according to demand. As a result, an excessive selective pressure for targeted insects and pathogens are alleviated considerably, the possibility of auto mutation of the targeted insects and pathogens will be reduced, and the application duration of transgenic crop varieties will be prolonged effectively. | 2009-03-26 |
20090083882 | METHOD FOR INCREASING THE TOTAL OIL CONTENT IN OIL PLANTS - The invention relates to methods of increasing the total oil content and/or the glycerol 3-phosphate content in transgenic oil crop plants which comprise at least 20% by weight of oleic acid based on the total fatty acid content, preferably in plant seeds, by expressing glycerol 3-phosphate dehydrogenases (G3PDHs) from yeasts, preferably from | 2009-03-26 |
20090083883 | D-Amino Acid Selection For Soybean - The present invention relates to improved methods and means for transformation of soybean ( | 2009-03-26 |
20090083884 | Method of Separating Embryo Suspension Mass - A method of separating an embryo suspension mass is provided. The method includes supplying an embryo suspension mass culture having a plurality of first particles of a first size and a plurality of second particles of a second size different at least in part from the first size of the first particles. The method also includes suspending the embryo suspension mass culture in a fluid to create a mixture and forcing the mixture through a filter while maintaining the mixture in the fluid to separate the first particles from the second particles. | 2009-03-26 |
20090083885 | PLANT PRODUCED VACCINE FOR AMEBIASIS - Disclosed herein are methods of making a vaccine against Entamoeba histolytica and methods of immunizing a subject using such vaccine. Specifically exemplified are plants expressing a LecA polypeptide and plant material obtained from such plant being used as a basis for vaccination | 2009-03-26 |
20090083886 | TRANSGENIC PLANTS WITH INCREASED GLYCINE-BETAINE - Disclosed herein are transgenic plants and seed having an exogenous DNA which expresses a GB1 protein that imparts increased glycine-betaine content in plants. | 2009-03-26 |
20090083887 | Pittosporum plant named 'Elfin' - A new cultivar of | 2009-03-26 |
20090083888 | AGLAONEMA PLANT NAMED 'TWYAG0022' | 2009-03-26 |
20090083889 | AGLAONEMA PLANT NAMED 'TWYAG0054' | 2009-03-26 |