13th week of 2011 patent applcation highlights part 59 |
Patent application number | Title | Published |
20110078723 | REAL TIME TELEVISION ADVERTISEMENT SHAPING - A multimedia client receives, over a subscription multimedia network, television content for presentation to a viewer, where the television content includes an advertising break and identifies a keyword associated with the television content. The multimedia client sends, over the subscription multimedia network, the keyword to an advertisement server and receives from the advertisement server, an advertisement corresponding to the keyword. The multimedia client then provides, for display to the viewer, the advertisement within the advertising break. | 2011-03-31 |
20110078724 | TRANSACTIONAL ADVERTISING FOR TELEVISION - A method is performed by one or more devices within a closed distribution network to provide transactional advertisements. The method includes sending, over the closed distribution network, an advertisement for presentation by a video client, where the advertisement includes a transactional link; and receiving, over the closed distribution network, a notification from the video client that a user has selected the transactional link. The method also includes automatically establishing, based on the notification, a communication session between the video client and a server associated with the advertisement, where the communication session enables a transactional exchange between the user of the video client and the server associated with the advertisement. | 2011-03-31 |
20110078725 | MULTI-MEDIA AUDIO/VISUAL ADVERTISING SYSTEM - The multi-media audio/visual advertising system of the present invention includes a plurality of visual monitors and audio/visual sources that are strategically located where large groups of people gather. The audio/visual advertising programming on the multi-media audio/visual advertising system may run up to twenty-four hours a day and consists of a plurality of audio/visual slots. The audio/visual advertising is capable of audio or textual presentation of the audio source on the plurality of visual monitors. Each one of the plurality of audio/visual slots is sold to advertisers who have the option of purchasing multiple visual slots to create visual advertising programming of a desired duration. The multi-media visual advertising system allows monitors to be placed at multiple locations and display an audio/visual presentation that gives an advertiser a huge advantage over a competitor that merely uses background art billboard advertising systems. | 2011-03-31 |
20110078726 | SYSTEMS AND METHODS FOR AUTOMATICALLY GENERATING ADVERTISEMENTS USING A MEDIA GUIDANCE APPLICATION - Systems and methods for automatically generating advertisements using a media guidance application are provided. In some embodiments, an advertisement database is searched to identify a stored advertisement for display in an advertisement display region of a media guidance application display screen. Upon determining that the advertisement database does not include a suitable stored advertisement, a new advertisement may be generated for display in the advertisement display region. | 2011-03-31 |
20110078727 | SYSTEMS AND METHODS FOR HANDLING ADVERTISEMENTS IN CONJUNCTION WITH NETWORK-BASED BOOKMARKING - Systems and methods according to the exemplary embodiments provide for bookmarking of content in IPTV systems. An IPTV control server can subscribe to receive notifications associated with the insertion of advertisements into other content. Upon receipt of a bookmark storing request, the IPTV control server can determine whether the bookmark storing request is associated with an advertisement or with the other content. A bookmark can then be stored by the IPTV control server including a content identifier based on the determination. | 2011-03-31 |
20110078728 | METHOD AND MEANS FOR PROVIDING ELECTRONIC PROGRAM GUIDE AND A METHOD AND MEANS FOR POSTING AND PRESENTING ADVERTISEMENT - Methods of and devices for providing EPG in a content server and in a multimedia server for assistance are provided. The method of providing EPG comprises: obtaining the titles and playtime of a first number of multimedia contents; generating an electronic program guide including the titles and playtime of the first number of multimedia contents; and sending the electronic program guide to the user equipments. Furthermore, methods of and devices for posting and present advertisements are provided. | 2011-03-31 |
20110078729 | SYSTEMS AND METHODS FOR IDENTIFYING AUDIO CONTENT USING AN INTERACTIVE MEDIA GUIDANCE APPLICATION - Systems and methods for identifying audio using a media guidance application where a video program that includes one or more audio assets is received by user equipment. The user initiates a request to identify an audio asset playing within the video program and the audio asset is identified by processing data associated with the audio asset and data within a database of audio asset information associated with a plurality of known audio assets. The audio asset information associated with the identified audio asset is then provided to a user interface for display. | 2011-03-31 |
20110078730 | METHOD AND APPARATUS FOR SCHEDULING RADIO ACCESS TO REDUCE CHANNEL ZAPPING DELAY - Provided is a method and apparatus for scheduling a radio access to reduce a channel zapping delay. The radio access scheduling method may receive abstract information with respect to all of currently receivable channels at each channel scheduling interval, and may receive the abstract information in advance and provide the abstract information when a channel change request is received, and thereby reduce the channel zapping delay. | 2011-03-31 |
20110078731 | SYSTEMS AND METHODS FOR MULTIPLE MEDIA GUIDANCE APPLICATION NAVIGATION - Systems and methods for allowing a user to access media guidance application settings from any given mobile device and centralize the settings using a media equipment device are provided. One or more mobile devices may be detected with a media equipment device. The media equipment device may receive mobile media guidance application settings from the detected mobile devices. The media equipment device may replicate a mobile media guidance application for each of the detected mobile devices based on the received settings. Access to the replicated mobile media guidance applications associated with the detected mobile devices may be provided on the media equipment device. Changes to the settings of the replicated mobile media guidance applications associated with the detected mobile devices may be tracked and transmitted to the corresponding mobile device. The mobile device may modify a mobile media guidance application based on the changes received from the media equipment device. | 2011-03-31 |
20110078732 | METHOD AND SYSTEM FOR CAUSING A PROMOTED PROGRAM TO BE CAPTURED - A method implemented at a network entity. The method comprises receiving an indication of a selection made by a user while the user is viewing a stream of video content, obtaining programming information regarding a program promoted in the stream of video content when the selection was made and causing the program to be captured for the user at least in part on the basis of the programming information regarding the program. | 2011-03-31 |
20110078733 | CONTROLLING PROGRAM GUIDE IN BROADCAST RECEIVING DEVICE - A broadcast receiving device and a method for change one or more configurations of windows of a program guide displayed on a display unit of a broadcast receiving device according to a user input, are discussed. | 2011-03-31 |
20110078734 | METHOD FOR OPERATING AN INTERACTIVE PROGRAM GUIDE, A USER DEVICE FOR AN INTERACTIVE PROGRAM GUIDE, A METHOD AND A DEVICE FOR PROVIDING A CONSOLIDATED DATA GUIDE INFORMATION LISTING - A method for displaying an interactive program guide, a user device for an interactive program guide, a method and device for providing a consolidated data guide information listing are disclosed. A receiver is configured to receive individual data guide information from at least two information sources. A controller is configured to combine the received individual data guide information to form a consolidated data guide information listing and to output the consolidated data guide information listing. A displayer is configured to generate a display of at least a portion of the consolidated data guide information listing output to the controller. | 2011-03-31 |
20110078735 | APPARATUS, SYSTEMS AND METHODS FOR RICH MEDIA ELECTRONIC PROGRAM GUIDES - Electronic program guide (EPG) systems and methods are operable to incorporate image information into an EPG generated at a media device. An exemplary embodiment receives an image associated with a program, processes the received image into a rich media EPG image, receives program presentation schedule information that specifies a presentation schedule of a plurality of programs, wherein the program is one of the plurality of programs scheduled for presentation, associates an identifier with the rich media EPG image and the program, and generates a rich media EPG schedule based upon the received program presentation schedule information and the identifier. | 2011-03-31 |
20110078736 | SYSTEMS AND METHODS FOR PROVIDING AN OPEN AND COLLABORATIVE MEDIA GUIDANCE APPLICATION - Systems and methods for an open and collaborative media guidance application are provided. Users may join a distribution list to receive and/or provide modifications to media asset description information. A user may provide a modification to the media asset description information provided that he/she has sufficient authorization. The modification may be transmitted to a central server. The central server may filter the modification for improper information. The central server may update the media asset description information based on the received modification. The central server may transmit the modification or the updated media asset description information to media equipment devices associated with a distribution list. The media equipment devices may receive the modifications and process the modification based on local settings to update the locally stored media asset description information. | 2011-03-31 |
20110078737 | RECEIVER APPARATUS AND REPRODUCING APPARATUS - For executing a graphic display without generating the sense of incompatibility in a view, within a receiver apparatus enabling 3D display, and also for an improvement of usability thereof, a receiver apparatus or a reproducing apparatus for obtaining digital information including information of whether a cubic display can be made or not, together with video information, comprises a controller portion for producing graphic data for use of display added with a parallax thereto, wherein the graphic data without generating a sense of incompatibility to a user by changing all or a part of the graphic data for use of display into data for use of cubic display, when producing the data fitting to a condition of a cubic display of an output video. In particular, when producing data of electronic program table, the cubic display is executed, partially, fitting to an object, and thereby increasing usability for a user. | 2011-03-31 |
20110078738 | EPG aligning events by time on cylinder - An apparatus | 2011-03-31 |
20110078739 | APPARATUS AND METHOD FOR PRODUCING AN EPG - The present invention relates to an apparatus and method for producing an EPG from program information in an EPG database for a plurality of channels. The EPG displays items relating to the programs available on a plurality of channels at a specified time. When the specified time is changed, the EPG updates the items corresponding to channels on which the available program is not the same at the newly specified time as at the previously specified time. | 2011-03-31 |
20110078740 | ADVANCE NOTICE OF TELEVISION ADVERTISEMENTS - A video client receives an advertising map over a subscription multimedia network, where the advertising map includes a schedule of default advertisements during a programming break and indications of available alternate advertisements. The video client provides, for display to a user, indicators for the schedule of default advertisements and receives user input to alter the schedule of default advertisements. The video client retrieves advertising content for the altered schedule and presents, on the display and during the programming break, the advertising content for the altered schedule. | 2011-03-31 |
20110078741 | ELECTRONIC PROGRAM GUIDE - An apparatus | 2011-03-31 |
20110078742 | APPARATUS AND METHOD FOR SEARCHING FOR BROADCAST PROGRAM IN A DIGITAL BROADCASTING RECEIVER - A method and apparatus for searching for a broadcast program in a digital broadcasting receiver are provided, in which a program search option window including search options for a program search is displayed on a display by a screen generator, upon receipt of a program search request from a user, broadcast programs matching a search option selected from among the search options included in the program search option window by the user are searched for by the screen generator, and a program search result screen including a list of the detected broadcast programs is displayed on the display by the screen generator. | 2011-03-31 |
20110078743 | CHANNEL CONTROL METHOD AND APPARATUS - A channel control method and apparatus of a broadcast reception system are provided for facilitating channel selection by providing multiple broadcast channel images on a screen. A method of managing channels for a channel control device includes receiving video images of plural channels from a content delivery device, displaying the video images of plural channels on a screen simultaneously, receiving an input for selecting at least one of the plural channels; and transmitting a channel selection request indicating the selected channel to the content delivery device. The channel control method and apparatus are capable of facilitating a user to search for broadcast channels, resulting in improvement of the user's convenience. | 2011-03-31 |
20110078744 | DIGITAL VIDEO RECORDER NOTIFICATIONS - A method for providing notifications relating to a digital video recorder (DVR), may include identifying an issue or conflict associated with the DVR. It may be determined whether to generate a notification message relating to the identified issue or conflict. The notification message may be generated when it is determined to generate a notification message relating to the identified issue/conflict. The notification message may be transmitted to a user device separate from the DVR. | 2011-03-31 |
20110078745 | SYSTEMS AND METHODS FOR CAPTURING VIDEO RELATED TO PRODUCTS - In one embodiment, the present invention is a t-commerce platform, which is linked to the content from a video signal that the user is currently watching. At some point during the broadcast of the content, a close-up of the product is shown. Simultaneous with this, a VBI-based trigger is added to the video signal of the broadcast. This trigger causes the television, a set-top box, or a similar device to capture in a memory, a “freeze-frame” of the image being shown. This action is transparent to the user while the video being displayed on the television is continuing normally. If the user chooses to perform an interactive “buy” transaction the saved image data is used as part of the interactive screen display. | 2011-03-31 |
20110078746 | SYSTEMS AND METHODS FOR DISPLAYING A BLOCKING OVERLAY IN A VIDEO - An overlay application provides users with opportunities to block or cover portions of the display area by displaying an overlay. The overlay may be displayed to block or cover PRI or may be used to block or cover any portion of the display area, even in the absence of PRI. The overlay may be displayed automatically based at least in part on the type of program, a particular scene, etc., or upon user request. | 2011-03-31 |
20110078747 | SYSTEMS AND METHODS FOR DISPLAYING A BLOCKING OVERLAY IN A VIDEO - An overlay application provides users with opportunities to block or cover portions of the display area by displaying an overlay. The overlay application may be used to implement an interactive poker game. An overlay may be displayed to block or cover players' cards on the display screen during e.g., a poker tournament, allowing the viewer to actively participate in the poker game. The overlay may be controlled by a content provider or may be user controlled. | 2011-03-31 |
20110078748 | TELEVISION AND CONTROL METHOD THEREOF - A television and a control method thereof are provided. The television includes a communication unit which can communicate with external televisions; and a controller which detects, through the communication unit, data about a user setting item set in a television communicatable through the communication unit, and changes a user setting item based on the detected data. | 2011-03-31 |
20110078749 | EMBEDDED WIRELESS ANTENNA FOR NETWORK TV - A WiFi chipset is integrated into a TV chassis as are wireless audio-video signal antennas that feed the chipset and that are embedded in the display bezel. The TV processor causes signals from home network components received through the antennas and chipset to be displayed on the TV. | 2011-03-31 |
20110078750 | TRICKPLAY IN MEDIA FILE - A method and apparatus to perform trickplay processing by a client computing system during the playback of a downloaded media file, regardless of how far along the download has progressed. The client computing system determines whether it is configured to play the media file in trickplay mode and identifies, by a keyframe identifier module, a first keyframe in the media file. The keyframe is retrieved using index information contained within the media file and displayed on a display as part of the trickplay processing. If the client computing system is still in trickplay mode, the next keyframe is identified and the process repeats. Once the client computing system has exited trickplay mode, the keyframe identifier module identifies the closest keyframe to the current position in the media file and begins normal playback of the media file at the location of the closest keyframe. | 2011-03-31 |
20110078751 | METHOD OF REQUESTING VIDEO DATA DISTRIBUTED ACROSS A PLURALITY OF VIDEO SERVERS - A method of requesting video data distributed across a plurality of video servers ( | 2011-03-31 |
20110078752 | SET-TOP BOX AND METHOD OF PROVIDING VIDEO ON DEMAND THERETO - A method of providing video on demand to a set-top box includes sending playing parameters of a video file to a video on demand server, and receiving information of the video file and predetermined quality of service parameters of the set-top box. The method further includes receiving updated quality of service parameters input by a user, and sending the updated quality of service parameters to a worldwide interoperability for microwave access client module of the set-top box, and sending the updated quality of service parameters to a worldwide interoperability for microwave access base station. The method also includes sending a playback instruction to the video on demand server, and receiving video streaming data of the video file based on the updated quality of service parameters from the video on demand server. | 2011-03-31 |
20110078753 | System and method for providing media content enhancement - There are provided systems and methods for providing media content enhancement. A system for providing enhancement of media content displayed by a presentation unit of the system comprises the presentation unit configured to receive and display the media content, and a content enhancement module stored in a memory of the presentation unit. The presentation unit also includes a processor configured to control the content enhancement module to enhance the media content. A method for use by the content enhancement module comprises reading a context data received by the presentation unit, the context data describing a media content provided for display by the presentation unit, processing the context data to identify the media content, requesting an enhancement data corresponding to the media content, and executing instructions received in the enhancement data to enhance the media content displayed by the presentation unit. | 2011-03-31 |
20110078754 | APPARATUS AND METHOD FOR MEDIA DETECTION AND REPLACEMENT - A system that incorporates teachings of the present disclosure may include, for example, a server having a controller configured to receive a selection from a computing device during presentation of a media program comprising at least one of audio content and textual content associated with the audio content, wherein the selection identifies media content of interest, receive a selection from the computing device identifying replacement content for the media program, detect whether the media program contains the identified media content of interest, and replace the identified media content of interest with the replacement content if the identified media content of interest is detected in the media program. Other embodiments are disclosed. | 2011-03-31 |
20110078755 | Passive Optical Network Data Over Cable Service Interface Specification Upstream Proxy Architecture Over the Next Generation Hybrid Fiber-Coaxial Networks - An apparatus comprising a wavelength division multiplexer (WDM), an optical network unit (ONU) coupled to the WDM, a passive optical network (PON) data over cable service interface specification (DOCSIS) upstream proxy (PDUP) coupled to the ONU and configured to couple to a coaxial cable, and a downstream (DS) optical/electrical (O/E) converter coupled to the WDM and configured to couple to the coaxial cable. An apparatus comprising a WDM, an optical line terminal (OLT) coupled to the WDM, a cable model termination system (CMTS) coupled to the OLT via an upstream external physical (PHY) interface (UEPI), and a DOCSIS and a Quadrature Amplitude Modulation (QAM) unit coupled to the WDM and the CMTS. | 2011-03-31 |
20110078756 | Methods, Systems And Computer Program Products For Providing Internet Protocol Television Set Up - A method of providing set up services to customer premise equipment (CPE), the CPE coupled to an interne protocol television (IPTV) network. The method includes operating a network element as a set up terminal server, the network element being part of a communications network. A request to initiate a set up process is received from the CPE. A set up server coupled to the communications network is accessed to initiate a set up application. The set up server communicates with the CPE through the network element to perform installation of the CPE and provisioning of the CPE. | 2011-03-31 |
20110078757 | PROVISIONING A SET-TOP BOX - A method of provisioning a set-top box (STB) with a provisioning server is disclosed. In the method, a provisioning request is received from a STB, where the provisioning request includes a provisioning stream identifier, an authorization server identifier, and a STB address. The provisioning server requests a provisioning system generate a configuration for the STB, where the configuration includes a channel map and basic code. The provisioning server receives the configuration from the provisioning system. The provisioning server prepares provisioning information, including the configuration for the STB and sends the provisioning information to the STB using the identifier for the STB. | 2011-03-31 |
20110078758 | METHOD AND DEVICE FOR CONTROLLING USE OF CONTEXT INFORMATION OF A USER - A method and device for controlling use of context information of a user includes establishing a context policy enforcement engine on a mobile computing device. The context policy enforcement engine may be embodied as software and/or hardware components. The context policy enforcement engine retrieves context policy data in response to receiving a request for context information related to a user. The context policy data defines a set of context rules for responding to context requests. The context policy enforcement engine responds to the request based on the set of context rules. | 2011-03-31 |
20110078759 | Method and System For Automating Security Policy Definition Based On Recorded Transactions - Following development of an application, the application is deployed in a pre-production environment. A user role plays against that application, typically by performing one or more operations as a particular user in a particular group. As the operator role plays, access logs are written, and these logs are then analyzed and consolidated into a set of commands that drive a policy generator. The policy generator creates an optimized security policy that it then deploys to one or more enforcement points. In this manner, the framework enables automated configuration and deployment of one or more security policies. | 2011-03-31 |
20110078760 | SECURE DIRECT MEMORY ACCESS - A data processing system comprises a memory, a memory protection unit, and one or more IP units connected to the memory via the memory protection unit. The memory protection unit is arranged to logically partition the memory into different regions, to maintain a policy for each region, the policy defining access rights to the respective region and defining the safety status of data written in the respective region, to check access requests writing data from a first region to a second region, and to refuse the access request if the safety status, according to the respective policy, of the written data in the second region is not maintained. | 2011-03-31 |
20110078761 | METHOD AND APPARATUS FOR EMBEDDING REQUESTS FOR CONTENT IN FEEDS - An approach is provided for embedding requests for news inputs in web feeds to news input sources. A request for news input is received in conjunction with a web feed. The request includes filtering information for targeting news input sources. And, the web feed with the request for news input embedded in the web feed is caused at least in part to be transmitted to a news input source that satisfies the filtering information. | 2011-03-31 |
20110078762 | MOBILE OR USER DEVICE AUTHENTICATION AND TRACKING - A system and method, according to one or more embodiments, includes a server computing device configured to communicate with a network-based device via a network; a visitor identification, in which the system generates the visitor identification and the visitor identification corresponds to a piece of information that is unique to the network-based device; a mapping for which the system adds the generated visitor identification to the mapping so that the visitor identification uniquely identifies the network-based device from all other network-based devices in communication with the server computing device; and a database in which the system tracks the visitor identification among a plurality of visitor identifications in the database. | 2011-03-31 |
20110078763 | Immobilization module for security on a communication system - Example embodiments are directed to a method of controlling a self-sufficient network system to prevent unauthorized use of the self-sufficient network. The method includes receiving an activation request from the self-sufficient network system and authenticating the self-sufficient network system based on the activation request. The self-sufficient network system is functional if the activation request is valid and the self-sufficient network system has reduced functionality if the activation request is not valid. | 2011-03-31 |
20110078764 | TIGHT COUPLING SIGNALING CONNECTION MANAGEMENT FOR COUPLING A WIRELESS NETWORK WITH A CELLULAR NETWORK - A method for communicating between a cellular system and a client terminal such as a mobile terminal by way of a standard wireless LAN and the Internet allows data communications to traverse the core of the cellular network, thereby allowing monitoring of the time and volume usage by the subscriber for billing purposes. The mobile terminal has a communication protocol for communicating with the wireless LAN, over which is a EAP/EAPOL protocol. A Radio Adaptation Layer protocol overlies the EAP/EAPOL protocol. At the cellular system, a Serving GPRS Support Node establishes initial control contact with the mobile terminal by way of EAP/EAPOL. During authentication, the Support Node gives the mobile terminal parameters for an alternative tunnel connection. Once authorization is complete, the mobile terminal closes the EAP/EAPOL connection and opens a new connection tunnel to the Support Node using the parameters. | 2011-03-31 |
20110078765 | SYSTEM AND METHOD FOR ESTABLISHING HISTORICAL USAGE-BASED HARDWARE TRUST - Establishing trust according to historical usage of selected hardware involves providing a usage history for a selected client device; and extending trust to a selected user based on the user's usage history of the client device. The usage history is embodied as signed statements issued by a third party or an authentication server. The issued statement is stored either on the client device, or on an authentication server. The usage history is updated every time a user is authenticated from the selected client device. By combining the usage history with conventional user authentication, an enhanced trust level is readily established. The enhanced, hardware-based trust provided by logging on from a trusted client may eliminate the necessity of requiring secondary authentication for e-commerce and financial services transactions, and may also be used to facilitate password recovery and conflict resolution in the case of stolen passwords. | 2011-03-31 |
20110078766 | SYSTEM AND METHOD FOR BOOKMARKING AND TAGGING A CONTENT ITEM - The present invention is directed towards systems and methods for saving and tagging a content item available on a computer network, including saving and bookmarking a reference to a content item. According to one embodiment of a method according to the present invention, a user navigates to a content item and selects a control to save a bookmark to the content item. A bookmarking and tagging server receives one or more items of tag information that are related to the bookmarked content item, which are saved in conjunction with the one or more items of tag information. | 2011-03-31 |
20110078767 | USAGE CONTROL SERVICES PERFORMED IN AN END USER DEVICE - Systems and methods are disclosed for providing usage control of communication services within an end user device. A system in the network receives input from a controlling party defining usage restrictions for the end user device. The system then generates a usage control profile, and transmits the usage control profile to the end user device. The end user device then monitors activities in the device to identify a communication attempt (e.g., an incoming voice call). When a communication attempt is identified, the end user device processes the usage control profile to determine whether the communication attempt is authorized, and allows the communication attempt to continue if the attempt is authorized. If the attempt is not authorized, then the end user device blocks the communication attempt. | 2011-03-31 |
20110078768 | METHOD FOR DATA TRANSMISSION BETWEEN SERVER AND CLIENT - A method is used for data transmission between a server and a client. The method includes the following steps. The server receives a request from the client through a network. The server determines if the client has access authorization. The server creates a background process when acquiring the access authorization. The server receives a data block and a status checking request from the client. The background process sends a data report to the client for each data block received. The server submits a status report in response to the status checking request. | 2011-03-31 |
20110078769 | ELECTRONIC FILE BROWSING SYSTEM AND CONTROL METHOD THEREOF - An electronic file browsing system includes an electronic file delivery device and a file processing server. When document file browsing is requested from a mobile phone, a mobile phone access server in the file delivery device creates link information including session ID as authentication information and sends it to the mobile phone. Based on this link information, the mobile phone accesses the file processing server. The file processing server obtains session ID from the mobile phone and adds this session ID to the delivery request of the document file to the mobile phone access server. | 2011-03-31 |
20110078770 | USER INFORMATION POPULATION - Methods and systems are provided for populating user related information, such as in forms at web sites. For example, a method can include providing a web site with information about a user during the front end of accessing the web site by the user. The information can be used to facilitate use of the web site by the user. A system for facilitating access of a web site by a user can comprise an ID provider that is configured to receive a request from a web site for information regarding a user, request information regarding the user from an information provider, and forward the information to the web site. By providing such information to the web site, log on, sign in, and/or registration with a web site can be done quickly, conveniently, and in a manner that is substantially less prone to errors. | 2011-03-31 |
20110078771 | ELECTRONIC DEVICE FOR DISPLAYING A PLURALITY OF WEB LINKS BASED UPON FINGER AUTHENTICATION AND ASSOCIATED METHODS - An electronic device is for communicating with a remote server hosting a web feed of updated content including a plurality of web links. The electronic device includes a finger biometric sensor, a display, and a processor. The processor is for authenticating a finger placed adjacent the finger biometric sensor, and displaying on the display the plurality of web links from the web feed of updated content based upon authenticating the finger. The processor is also for associating account access data with the authenticated finger, and accessing information from a selected web link based upon the account access data associated with the authenticated finger. Additionally, the processor is for downloading and displaying on the display information from the selected web link. | 2011-03-31 |
20110078772 | LDAP SECURITY DOMAIN DATA STORAGE - A Security Domain Access System (SDAS) provides highly available security domain data. The SDAS receives a request pertaining to a security domain. The request includes credentials for accessing a security domain manager server. The SDAS selects one of a plurality of security domain manager servers to process the request based on the credentials and the availability of each of the plurality of security domain manager servers. The SDAS forwards the request to the selected security domain manager server. | 2011-03-31 |
20110078773 | MOBILE TERMINAL AUTHORISATION ARRANGEMENTS - An end-to-end client server system and related method for use in conjunction with mobile terminals. A client application on a mobile terminal is configured to remotely access a backend server via a gateway system. The mobile terminal includes a client application configured to generate a one time password using secret information and a password library, both known only to the client application and a verification component of the gateway system. The one time password provides an additional level of security, which is user dependent and not network dependent. | 2011-03-31 |
20110078774 | METHOD AND APPARATUS FOR ACCESSING SECURE DATA IN A DISPERSED STORAGE SYSTEM - A method begins by a processing module receiving, from a user device, a request to access secure data, wherein the request includes a user identification code and at least one object name for the secure data. The method continues with the processing module processing the request to determine a security level associated with the user device and to determine security parameters associated with the secure data. The method continues with the processing module determining a level of access to the secure data based on the security level associated with the user device and the security parameters. The method continues with the processing module retrieving a set of encoded data slices from dispersed storage units, wherein the set of encoded data slices includes less than a reconstruction threshold number of encoded data slices and generating a response that includes the set of encoded data slices when the level of access is a partial access level. | 2011-03-31 |
20110078775 | METHOD AND APPARATUS FOR PROVIDING CREDIBILITY INFORMATION OVER AN AD-HOC NETWORK - An approach for providing credibility information over an ad-hoc network is described. A trust manager receives content from a transmitting node over an ad-hoc network. The trust manager retrieves one or more trust values associated with the content, the transmitting node, or both, wherein the trust values are assigned by a trust server and further adjusted based on locally collected credibility information. The trust manager conducts a local evaluation of credibility information regarding the content, the transmitting node, or both. The trust manager then generates one or more combined trust values for the content, the transmitting node, or both from the trust values and the local evaluation. | 2011-03-31 |
20110078776 | Secure digital credential sharing arrangement - A secure and transparent digital credential sharing arrangement which utilizes one or more cryptographic levels of indirection to obfuscate a sharing entity's credentials from those entities authorized to share the credentials. A security policy table is provided which allows the sharing entity to selectively authorize or revoke digital credential sharing among a plurality of entities. Various embodiments of the invention provide for secure storage and retrieval of digital credentials from security tokens such as smart cards. The secure sharing arrangement may be implemented in hierarchical or non-hierarchical embodiments as desired. | 2011-03-31 |
20110078777 | Computer-readable recording medium recording remote control program, portable terminal device and gateway device - A computer-readable recording medium which records a remote control program for allowing data on a network protected by a gateway device to be transferred to an external device by external remote-control operations; a portable terminal device; and a gateway device. The terminal device transmits to the gateway device an access ticket issue request. The gateway device generates key information and transmits to the terminal device an access ticket including the key information. The terminal device transfers to a data acquisition device a data acquisition instruction including the acquired access ticket. The acquisition device transmits to the gateway device a data request including the key information. When the key information added to the access ticket and the key information included in the data request are the same, the gateway device transfers the data request to a data server device. The server device transfers the data to the acquisition device. | 2011-03-31 |
20110078778 | MULTI-VARIABLE CHALLENGE AND RESPONSE FOR CONTENT SECURITY - Embodiments of the present invention provide a method, system and computer program product for multi-variable challenge-response. In an embodiment of the invention, a method for multi-variable challenge-response can include receiving a request to access content from an end user computing device from over a computer communications network. The method also can include selecting different objects for inclusion in an object set and applying a different characteristic to each of the different objects in the object set. A question and answer can be generated based upon each of the different characteristics. Further, a challenge-response prompt can be transmitted to the end user computing device such that the prompt includes the different objects with different characteristics applied, and also the generated question. A response to the challenge-response prompt can be received and compared the response to the computed answer. Finally, access to the content can be granted if the response and computed answer match, but otherwise access to the content can be denied. | 2011-03-31 |
20110078779 | Anonymous Preservation of a Relationship and Its Application in Account System Management - Disclosed is a system or method of using hash functions to preserve a relationship. A relationship is anonymously preserved by storing the hash result of a relationship token that comprises a finite set of values of a plurality of objects. Specifically, an account anonymous identifier of an account can be produced by hashing a relationship token that comprises identity information of an owner of said account. A party that has enough knowledge of an account owner can independently produces said account anonymous identifier and therefore, securely communicates with a specific account without prior communication or a password. An account owner can further prove his/her ownership of an account by submitting related documents and a relationship token that comprises his/her identity information to an account system. | 2011-03-31 |
20110078780 | USER AUTHENTICATION SYSTEM AND METHOD FOR ENCRYPTION AND DECRYPTION - A system configured to authenticate a user for encryption or decryption includes a user authentication apparatus, a computer-readable medium operable to communicate with the user authentication apparatus, and an encryption and decryption computer communicating with the user authentication apparatus. The computer-readable medium may store user identifying information and encryption and decryption data. The encryption and decryption computer may be configured to receive an application programming interface (API) for interfacing with the user authentication apparatus and receive the user identifying information from the computer-readable medium via the API. A user may be authenticated based on the user identifying information and, once the user is authenticated, the encryption and decryption data may be read. | 2011-03-31 |
20110078781 | Framework for Communicating Across a Firewall - A system for enabling communication between a first domain and a second domain is disclosed. At least the first domain is protected by a firewall. A first data-processing system is provided in the first domain and a second data-processing system provided in second domain. The second domain hosts an application that the first domain desires to access. To enable the communication between the two domains a tunnel is established through the firewall. The tunnel runs from the first data-processing system to the second data-processing system. The second data-processing system provides a web-proxy interface to interface to the application and also acts as a tunnel gateway. | 2011-03-31 |
20110078782 | IP COMMUNICATION DEVICE AS FIREWALL BETWEEN NETWORK AND COMPUTER SYSTEM - Methods, systems, and apparatuses are described for implementations of an Internet protocol (IP) communication device (e.g., an IP phone) that contains a firewall. The IP communication device is coupled between a computer system and a network. A data packet is received at a first port of the IP communication device. The data packet is filtered with the firewall included in the IP communication device. The filtered data packet may be transmitted from a second port of the IP communication device (in modified or unmodified form), or may be canceled based on the filtering. In one implementation, the first port is coupled to the network and the second port is coupled to the computer system. In another implementation, the first port is coupled to the computer system and the second port is coupled to the network. | 2011-03-31 |
20110078783 | ENSURING QUALITY OF SERVICE OVER VPN IPSEC TUNNELS - Packet sequence number checking through a VPN tunnel may be performed by assigning sequence numbers on a per-priority class basis to packets traversing the VPN tunnel. In one implementation, a network device may receive a packet that is to be transmitted over a VPN tunnel, the packet including control information that includes at least a QoS priority class of the packet. The network device may extract the priority class of the packet from the control information and generate a sequence value that describes an arrival sequence of the packet relative to other received packets of the same priority class as the packet. The network device may additionally generate an IPsec header for the packet, the IPsec header including the sequence value and the priority class of the packet; attach the IPsec header to the packet; and transmit the packet through the VPN tunnel. | 2011-03-31 |
20110078784 | VPN SYSTEM AND METHOD OF CONTROLLING OPERATION OF SAME - A VPN management server transmits a seed to a client computer and VPN server. The client computer generates a VPN password from the seed using a prescribed algorithm and transmits the generated VPN password to the VPN server. The VPN server generates a password from the seed using an algorithm identical with the prescribed algorithm in the client computer. If the VPN password transmitted from the client computer and the VPN password generated in the VPN server match, the VPN server allows utilization of the VPN by reason of the fact that the client computer has been authenticated. Even if leakage of the seed occurs, the VPN password will not be generated unless the algorithm is analyzed. The result is enhanced security. | 2011-03-31 |
20110078785 | METHOD AND SYSTEM FOR SUPPORTING PORTABLE DESKTOP WITH ENHANCED FUNCTIONALITY - A method is disclosed for a peripheral portable desktop device. The peripheral portable desktop device is coupled with a workstation. In a second mode of operation, a portion of the peripheral portable desktop device is operatively coupled with the workstation for operation therewith to provide an ancillary function. In a first mode of operation data within the peripheral portable desktop device is used to support a personal desktop on the workstation. | 2011-03-31 |
20110078786 | Providing a User Input Interface Prior to Initiation of an Operating System - A processor-based system, including systems without keyboards, may receive user inputs prior to booting. This may done using the graphics controller to generate a window which allows the user to input information. The system firmware may then compare any user inputs, such as passwords, and may determine whether or not to actually initiate system booting. | 2011-03-31 |
20110078787 | METHOD AND SYSTEM FOR PROVISIONING PORTABLE DESKTOPS - A method is disclosed for provisioning of a peripheral portable desktop device. The peripheral portable desktop device is coupled with a workstation. A data file relating to an image for being stored within the peripheral portable desktop device is provided. The image includes secured data that is other than accessible absent user authorization data of a virtual user. Within the peripheral portable desktop device is stored data reflective of the image. A first user is then authorized to the peripheral portable desktop device by providing first user authorization data. For the first user is created a user account secured based on the first user authorization data. The account of the virtual user is accessed via the user account and the user account is configured to access the account of the virtual user upon access to the user account. | 2011-03-31 |
20110078788 | Electronic Device and Authentication Method of Electronic Device - An authentication method of an electronic device is disclosed. A plurality of key inputs is received from a user via activation of input keys. At least one key input from the key inputs is validated based on a predefined criterion to obtain a password. The password is compared to a registered password to obtain an authenticated password. | 2011-03-31 |
20110078789 | IMAGE FORMING APPARATUS, METHOD FOR CONTROLLING IMAGE FORMING APPARATUS, AND PROGRAM - The purpose of the present invention is to add a user restriction function with use of a card by a simple structure even with an inexpensive image forming apparatus. A CPU of an image forming apparatus determines a port of a signal acquired from a card R/W at the time of initialization of the connected IC card R/W. Then, the CPU of the image forming apparatus controls an execution or a stop of an application for performing authentication service processing corresponding to the port of the signal received from the card R/W. | 2011-03-31 |
20110078790 | API Signature Verification for High-Security Platforms - A system and method is disclosed for verifying whether a test API of a high-security software platform implements a reference API when a verification tool has insufficient permissions to detect one or more members of the test API. A signature is determined for a reference API implementation, which includes multiple API members. Determining the signature involves identifying a proper subset of the API members, where the subset excludes one or more API members that are not programmatically detectable by a given verification tool executing on a high-security platform that implements the reference API. The member may not be detectable by the verification tool because the tool has insufficient permission to programmatically detect the member on the high-security platform. The signature is then configured to indicate the members of the subset and not the excluded members. The signature is then stored. | 2011-03-31 |
20110078791 | Using chipset-based protected firmware for host software tamper detection and protection - A method, system, and computer program product for a host software tamper detection and protection service. A secure partition that is isolated from a host operating system of the host system, which may be implemented by firmware of a chipset of the host system, obtains file metadata from the host system and uses the file metadata to identify a first file for examination for tampering. The secure partition obtains data blocks for the first file, communicates with a service via an out-of-band communication channel, and uses information obtained from the service and the data blocks to determine whether the first file has been corrupted. The secure partition obtains the file metadata and the data blocks for the first file without invoking an operating system or file system of the host system. | 2011-03-31 |
20110078792 | SYSTEM AND METHOD FOR PROVIDING NETWORK SECURITY - A method includes receiving an indication of at least one detected security issue at a network device. The indication is received from a security agent at a security manager processor. The method includes polling, via the security manager processor, at least one other network device in response to the indication in order to retrieve additional information when the security manager processor determines that the additional information is needed. The method includes selecting, via the security manager processor, at least one executable security object responsive to the indication and the additional information. The method also includes initiating communication of the at least one executable security object to the network device via the security manager processor. | 2011-03-31 |
20110078793 | EXTENSIBLE AUTHENTICATION PROTOCOL ATTACK DETECTION SYSTEMS AND METHODS - The present disclosure provides systems and methods for detecting attacks against authentication mechanisms that generate Transport Layer Security (TLS) tunnels using a server public key. Such attacks can include misconfigured wireless local area network (WLAN) clients that fail to authenticate the server public key prior to creating the TLS tunnels and exchanging credentials. In an exemplary embodiment, an intrusion detection system (IDS) or intrusion prevention system (IPS) is aware of the server public key and monitors for authentication handshakes to detect invalid keys. | 2011-03-31 |
20110078794 | Network-Based Binary File Extraction and Analysis for Malware Detection - A system and method are disclosed for network-based file analysis for malware detection. Network content is received from a network tap. A binary packet is identified in the network content. A binary file, including the binary packet, is extracted from the network content. It is determined whether the extracted binary file is detected to be malware. | 2011-03-31 |
20110078795 | THREAT PROTECTION NETWORK - Threat protection networks are described. Embodiments of threat protection network in accordance with the invention use expert systems to determine the nature of potential threats to a remote computer. In several embodiments, a secure peer-to-peer network is used to rapidly distribute information concerning the nature of the potential threat through the threat protection network. One embodiment of the invention includes at least one client computer connected to a network, a server that stores threat definition data and is connected to the network, an expert system in communication with the server. In addition, the client computer is configured to refer potential threats to the server, the server is configured to refer to the expert system any potential threat forwarded by a client computer that is not identified in the threat definition data and the expert system is configured to determine whether the potential threat is an actual threat by exposing at least one test computer to the potential threat and observing the behavior of the test computer. | 2011-03-31 |
20110078796 | Trusted Operating Environment For Malware Detection - Described herein are techniques and apparatuses for scanning a computing device for malware and/or viruses. In various embodiments, a trusted operating environment, which may include a trusted operating system and/or a trusted antivirus tool, may be utilized with respect to a computing device. More particularly, the trusted operating system may be used to boot the computing device. Moreover, the trusted antivirus tool may search the computing device for malware definition updates (e.g., virus signature updates) and use the trusted operating system to scan the computing device for malware. In other embodiments, the trusted antivirus tool may scan the computing device and remove any viruses detected by the trusted antivirus tool. The trusted operating system may then reboot the computing device into a clean environment once any detected viruses are removed. | 2011-03-31 |
20110078797 | Endpoint security threat mitigation with virtual machine imaging - Methods and apparatus involve the mitigation of security threats at a computing endpoint, such as a server, including dynamic virtual machine imaging. During use, a threat assessment is undertaken to determine whether a server is compromised by a security threat. If so, a countermeasure to counteract the security threat is developed and installed on a virtual representation of the server. In this manner, the compromised server can be replaced with its virtual representation, but while always maintaining the availability of the endpoint in the computing environment. Other features contemplate configuration of the virtual representation from a cloned image of the compromised server at least as of a time just before the compromise and configuration on separate or same hardware platforms. Testing of the countermeasure to determine success is another feature as is monitoring data flows to identifying compromises, including types or severity. Computer program products and systems are also taught. | 2011-03-31 |
20110078798 | REMOTE PROCEDURE CALL (RPC) SERVICES FUZZ ATTACKING TOOL - A system and method for testing a computer program using a computer system includes a plurality of computer systems communicating using a network. An interface parser module defines at least one program interface in a program file of a specified program. A fuzzer module reads the program file and identifies the program interfaces. An attack data generator module attacks the program interfaces and communicates with the fuzzer, and the fuzzer determines vulnerabilities in the specified program. A recorder records the attacking procedure. A verifier verifies remedies for vulnerabilities by replaying the attacking procedure of the program interface and determining vulnerabilities. A service status detective module restarts the specified program when the specified program ceases to operate or crashes. | 2011-03-31 |
20110078799 | Computer system and method with anti-malware - In some embodiments, approaches may provide an out-of-band (OOB) agent to protect a platform. The OOB agent may be able to use non-TRS methods to measure and protect an in-band security agent. In some embodiments, a manageability engine can provide out of band connectivity to the in-band and out-of-band security agents and provide access to the system memory resources without having to rely on OS services. This can be used for a trusted anti-malware and remediation service. | 2011-03-31 |
20110078800 | DIGITAL CONTENT MANAGEMENT METHODS AND SYSTEMS - Digital content management methods and systems are provided. First, device ID of a first electronic device is received, and a data license including at least the device ID of the first electronic device, and a control license including at least a read authorization for a digital content are generated. Then, the digital content and the control license are packed as a content package, and the content package and the data license are respectively transmitted to the first electronic device. An electronic device determines whether the device ID of the electronic device conforms to the device ID recorded in the data license. If so, the digital content in the content package is allowed to be read according to the control license. A new data license is generated for the digital content according to the device ID of a second electronic device. The new data license is stored to the second electronic device, and the data license in the first electronic device is abrogated. Then, the content package is transmitted from the first electronic device to the second electronic device. | 2011-03-31 |
20110078801 | UTILITY COMPUTING WITH PREVIEW AND PAY FEATURE - A remote computing service is provided that allows a user to preview results of processing at a remote computing device on a client device before committing to pay for and download result data. The remote computing device derives a series of preview data sets from the result data processed at the remote computing devices. The client device receives the preview data sets and presents output to a user for inspection, evaluation or examination of various aspects of the result data. By allowing the user to inspect, evaluate or examine the result data based on the series of preview data sets, there are fewer occasions where the user needs to download the result data that may have a large size to the client device. Further, the series of preview data sets is structured so that the result data cannot be reconstructed by harvesting the series of preview data sets. Hence, the user cannot take advantage of the preview data to reconstruct the result data without paying for the result data. | 2011-03-31 |
20110078802 | DISPLAY DEVICE, DRIVE RECORDER, DISPLAY METHOD AND COMPUTER-READABLE MEDIUM - A display device displays data recorded in a portable recording medium by a drive recorder on a display unit. A code recording unit records a security code in the recording medium in which data is recorded by the drive recorder. A nonvolatile storage device stores a security code which is the same as the security code for use at the time of recording in the recording medium. A code acquisition unit acquires the security code from recorded contents of the recording medium in which the data is recorded by the drive recorder. A code authentication unit enables the display unit to display the data recorded in the recording medium when the security code acquired from the recording medium coincides with the security code stored in the storage device. | 2011-03-31 |
20110078803 | Sex selected equine embryo production system - A sex selected equine embryo production system for the production of sex selected equine embryos and offspring by fertilization of oocytes with sex selected sperm by intracytoplasmic sperm injection. | 2011-03-31 |
20110078804 | Angiogenin and Amyotrophic Lateral Sclerosis - Methods and compositions for treating neurodegenerative disorders are provided. Transgenic animal models of neurodegenerative disorders are provided. Knockout animal models of neurodegenerative disorders are also provided. Mutant angiogenin polypeptides are also provided. | 2011-03-31 |
20110078805 | COMPOSITIONS AND METHODS FOR GENERATING TRANSGENIC ANIMALS - The present invention provides methods of altering gene expression of embryos to provide compositions and methods for efficient generation of transgenic animals. In particular, the present invention provides compositions and methods for generating germ-line transgenic animals by direct injection of nucleic acid molecules into animals. | 2011-03-31 |
20110078806 | POLYNUCLEOTIDES AND POLYPEPTIDES IN PLANTS - The invention relates to plant transcription factor polypeptides, polynucleotides that encode them, homologs from a variety of plant species, and methods of using the polynucleotides and polypeptides to produce transgenic plants having advantageous properties compared to a reference plant. Sequence information related to these polynucleotides and polypeptides can also be used in bioinformatic search methods and is also disclosed. | 2011-03-31 |
20110078807 | Wheat Cultivar DA904-32W - A wheat cultivar designated DA904-32W, is disclosed. The invention relates to the seeds of wheat cultivar DA904-32W, to the plants of wheat DA904-32W, and to methods for producing a wheat plant produced by crossing wheat cultivar DA904-32W with itself or another wheat variety. The invention also relates to methods for producing a wheat plant containing in its genetic material one or more transgenes and to the transgenic wheat plants and plant parts produced by those methods. The invention also relates to wheat varieties or breeding varieties and plant parts derived from wheat cultivar DA904-32W, to methods for producing other wheat varieties, lines or plant parts derived from wheat cultivar DA904-32W, and to the wheat plants, varieties, and their parts derived from the use of those methods. The invention further relates to hybrid wheat seeds and plants produced by crossing wheat cultivar DA904-32W with another wheat cultivar. | 2011-03-31 |
20110078808 | SOYBEAN CULTIVAR S080099 - A soybean cultivar designated S080099 is disclosed. The invention relates to the seeds of soybean cultivar S080099, to the plants of soybean S080099, to plant parts of soybean cultivar S080099, and to methods for producing a soybean plant produced by crossing soybean cultivar S080099 with itself or with another soybean variety. The invention also relates to methods for producing a soybean plant containing in its genetic material one or more transgenes and to the transgenic soybean plants and plant parts produced by those methods. This invention also relates to soybean cultivars, or breeding cultivars, and plant parts derived from soybean variety S080099, to methods for producing other soybean cultivars, lines or plant parts derived from soybean cultivar S080099, and to the soybean plants, varieties, and their parts derived from use of those methods. The invention further relates to hybrid soybean seeds, plants, and plant parts produced by crossing the cultivar S080099 with another soybean cultivar. | 2011-03-31 |
20110078809 | SOYBEAN CULTIVAR S080100 - A soybean cultivar designated S080100 is disclosed. The invention relates to the seeds of soybean cultivar S080100, to the plants of soybean S080100, to plant parts of soybean cultivar S080100, and to methods for producing a soybean plant produced by crossing soybean cultivar S080100 with itself or with another soybean variety. The invention also relates to methods for producing a soybean plant containing in its genetic material one or more transgenes and to the transgenic soybean plants and plant parts produced by those methods. This invention also relates to soybean cultivars, or breeding cultivars, and plant parts derived from soybean variety S080100, to methods for producing other soybean cultivars, lines or plant parts derived from soybean cultivar S080100, and to the soybean plants, varieties, and their parts derived from use of those methods. The invention further relates to hybrid soybean seeds, plants, and plant parts produced by crossing the cultivar S080100 with another soybean cultivar. | 2011-03-31 |
20110078810 | SOYBEAN CULTIVAR S080137 - A soybean cultivar designated S080137 is disclosed. The invention relates to the seeds of soybean cultivar S080137, to the plants of soybean S080137, to plant parts of soybean cultivar S080137, and to methods for producing a soybean plant produced by crossing soybean cultivar S080137 with itself or with another soybean variety. The invention also relates to methods for producing a soybean plant containing in its genetic material one or more transgenes and to the transgenic soybean plants and plant parts produced by those methods. This invention also relates to soybean cultivars, or breeding cultivars, and plant parts derived from soybean variety S080137, to methods for producing other soybean cultivars, lines or plant parts derived from soybean cultivar S080137, and to the soybean plants, varieties, and their parts derived from use of those methods. The invention further relates to hybrid soybean seeds, plants, and plant parts produced by crossing the cultivar S080137 with another soybean cultivar. | 2011-03-31 |
20110078811 | COTTON VARIETY FM 9160B2F - The cotton variety FM 9160B2F is disclosed. The invention relates to seeds, plants, plant cells, plant tissue, harvested products and cotton lint as well as to hybrid cotton plants and seeds obtained by repeatedly crossing plants of variety FM 9160B2F with other plants. The invention also relates to plants and varieties produced by the method of essential derivation from plants of FM 9160B2F and to plants of FM 9160B2F reproduced by vegetative methods, including but not limited to tissue culture of regenerable cells or tissue from FM 9160B2F. | 2011-03-31 |
20110078812 | LETTUCE CULTIVAR MANITOU - A lettuce cultivar, designated Manitou, is disclosed. The invention relates to the seeds of lettuce cultivar Manitou, to the plants of lettuce cultivar Manitou and to methods for producing a lettuce plant by crossing the cultivar Manitou with itself or another lettuce cultivar. The invention further relates to methods for producing a lettuce plant containing in its genetic material one or more transgenes and to the transgenic lettuce plants and plant parts produced by those methods. This invention also relates to lettuce cultivars or breeding cultivars and plant parts derived from lettuce cultivar Manitou, to methods for producing other lettuce cultivars, lines or plant parts derived from lettuce cultivar Manitou and to the lettuce plants, varieties, and their parts derived from the use of those methods. The invention further relates to hybrid lettuce seeds, plants, and plant parts produced by crossing cultivar Manitou with another lettuce cultivar. | 2011-03-31 |
20110078813 | LETTUCE CULTIVAR BOULDER - A lettuce cultivar, designated Boulder, is disclosed. The invention relates to the seeds of lettuce cultivar Boulder, to the plants of lettuce cultivar Boulder and to methods for producing a lettuce plant by crossing the cultivar Boulder with itself or another lettuce cultivar. The invention further relates to methods for producing a lettuce plant containing in its genetic material one or more transgenes and to the transgenic lettuce plants and plant parts produced by those methods. This invention also relates to lettuce cultivars or breeding cultivars and plant parts derived from lettuce cultivar Boulder, to methods for producing other lettuce cultivars, lines or plant parts derived from lettuce cultivar Boulder and to the lettuce plants, varieties, and their parts derived from the use of those methods. The invention further relates to hybrid lettuce seeds, plants, and plant parts produced by crossing cultivar Boulder with another lettuce cultivar. | 2011-03-31 |
20110078814 | SPONTANEOUS NODULATION IN PLANTS - Formation of nitrogen fixing root nodules in legumes is induced by perception of lipochitin-oligosaccharide signal molecules secreted by compatible | 2011-03-31 |
20110078815 | CYTOPLASMIC MALE STERILE RUCOLA - The present invention relates to a male sterile Rucola plant obtainable by a method which may comprise the steps of providing fertile pollen from | 2011-03-31 |
20110078816 | METHODS OF REDUCING PLANT STRESS - A method of regulating plant genes is provided. The method provides improved drought stress or salinity stress for plants. The method comprises treating a part of a plant or the locus thereof with a composition of matter, the composition of matter comprising an agriculturally acceptable mixture of compounds of natural organic material of defined composition. | 2011-03-31 |
20110078817 | CLONING OF CYTOCHROME P450 GENES FROM NICOTIANA - The present invention relates to p450 enzymes and nucleic acid sequences encoding p450 enzymes in | 2011-03-31 |
20110078818 | GENE FOR INCREASING THE PRODUCTION OF PLANT BIOMASS AND/OR SEEDS AND METHOD FOR USE THEREOF - A technique by which the production of plant biomass can be significantly increased is provided. A protein phosphatase 2C gene having 3 consensus sequences comprising the amino acid sequences shown in SEQ ID NOS: 1-3 from the N-terminal side in such order is over-expressed. | 2011-03-31 |
20110078819 | Method and Appartus for Extraction of Plant Embryos - The invention relates to rapid and efficient methods and apparatuses for displacing target plant materials from seeds. In one embodiment, the invention relates to methods and apparatuses for displacing embryos from maize seeds. In yet another embodiment, the displaced embryos can be propagated and regenerated into plants. | 2011-03-31 |
20110078820 | METHODS AND COMPOSITIONS FOR TRANSGENIC PLANTS PRODUCING ANTIMICROBIAL PEPTIDES FOR ENHANCED DISEASE RESISTANCE - The present invention provides methods and compositions for producing transgenic plants having increased disease resistance resulting from the expression of exogenous nucleotide sequences encoding antimicrobial peptides. | 2011-03-31 |
20110078821 | HEAT RESISTANT PLANTS AND PLANT TISSUES AND METHODS AND MATERIALS FOR MAKING AND USING SAME - The subject invention concerns materials and methods for providing plants or plant tissue with increased resistance to heat conditions and/or increased starch biosynthesis. Increased resistance of a plant or plant tissue to heat conditions provides for decreased yield losses as compared to the yield losses generally observed at elevated temperatures. One aspect of the invention concerns polynucleotides that encode a mutant plant small subunit of AGPase. The subject invention also comprises a mutant plant small subunit of AGPase encoded by a polynucleotide of the invention. The subject invention also concerns plants comprising a polynucleotide of the invention and method for making the plants. | 2011-03-31 |
20110078822 | Methods and Compositions for Enhanced Yield by Targeted Expression of Knotted1 - Methods and compositions for modulating expression of knotted1 (kn1) polypeptides in seed and reproductive tissue are provided. Polynucleotide sequences encoding knotted1 transcription factor polypeptides are expressed in a spatially and/or temporally regulated manner with expression preferentially in developing flowers, pods, ears and/or seeds, or to other reproductive structures during flowering and seed development, to create a sequestered effect resulting in plants that produce increased yield and may have greater flower, pod, ear and/or seed retention. Transformed plants, plant cells, tissues and seed are also provided. | 2011-03-31 |