15th week of 2010 patent applcation highlights part 66 |
Patent application number | Title | Published |
20100095304 | INFORMATION PROCESSING DEVICE AND LOAD ARBITRATION CONTROL METHOD - The information processing device in the simultaneous multi-threading system is operated in an inter-thread performance load arbitration control method, and includes: an instruction input control unit for sharing among threads control of inputting an instruction in an arithmetic unit for acquiring the instruction from memory and performing an operation on the basis of the instruction; a commit stack entry provided for each thread for holding information obtained by decoding the instruction; an instruction completion order control unit for updating the memory and a general purpose register depending on an arithmetic result obtained by the arithmetic unit in an order of the instructions input from the instruction input control unit; and a performance load balance analysis unit for detecting the information registered in the commit stack entry and controlling the instruction input control unit. | 2010-04-15 |
20100095305 | SIMULTANEOUS MULTITHREAD INSTRUCTION COMPLETION CONTROLLER - In a system that executes a program by simultaneously running a plurality of threads, the entries in a CSE | 2010-04-15 |
20100095306 | ARITHMETIC DEVICE - An arithmetic device simultaneously processes a plurality of threads and may continue the process by minimizing the degradation of the entire performance although a hardware error occurs. An arithmetic device | 2010-04-15 |
20100095307 | SELF-SYNCHRONIZING HARDWARE/SOFTWARE INTERFACE FOR MULTIMEDIA SOC DESIGN - A forced lock-step operation between a CPU (software) and the hardware is eliminated by unburdening the CPU from monitoring the hardware until it is finished with its task. This is done by providing a data/control message queue into which the CPU writes combined data/control messages and places an End tag into the queue when finished. The hardware checks the content of the message queue and starts decoding the incoming data. The hardware processes the data read from the message queue and the processed data is then written back into the message queue for use by the software. The hardware raises an interrupt signal to the CPU when reaching the End tag. Speed differences between hardware and software can be compensated for by changing the depth of the queue. | 2010-04-15 |
20100095308 | MANAGING QUEUES IN AN ASYNCHRONOUS MESSAGING SYSTEM - Managing an asynchronous messaging queue with a client computer in an asynchronous messaging system, where the client computer is programmed to store an manage the asynchronous messaging queue, includes receiving a reactive message in the asynchronous messaging queue, the reactive message including an identification of a referenced message and an action to be performed on the referenced message; and performing the action on the previously initiated message with the client computer if the referenced message is present in the asynchronous messaging queue. | 2010-04-15 |
20100095309 | NOTIFICATION SYSTEM FOR PUBLIC TRANSPORTATION VEHICLES - Methods and apparatus are provided for notifying individuals of the arrival and/or departure of public transportation vehicles. According to one aspect of the invention, one or more persons are notified regarding the location of a transportation vehicle. A subscription request is received from the one or more persons to receive a notification about the location of the transportation vehicle. The transportation vehicle is monitored to determine if one or more predefined notification events occur and a notification is sent if the predefined notification events occur. The predefined notification events comprise a predefined distance or time of the transportation vehicle from a predefined location. The subscription service is optionally fee-based. The system can optionally also provide entertainment to one or more riders on the transportation vehicle; determine an attendance of one or more riders on the transportation vehicle and/or identify one or more riders on the transportation vehicle using an identification token. | 2010-04-15 |
20100095310 | VIRTUALIZED STORAGE ASSIGNMENT METHOD - Various aspects are disclosed for building a device driver stack in a virtual machine partition that does not physically control the device represented by the stack. In an embodiment, a secondary interface and driver for an I/O device may be instantiated. Information from an I/O virtualization layer describing the devices that the associated driver may control may be requested. A multi-path redirection layer may provide a handle to an existing stack that includes a driver for the I/O device. This existing stack may then be used to communicate with the device and allow the creation of a new stack including an object representing the device and a new driver for the device. The multi-path redirection layer may then open a handle to the new stack and inform the device virtualization layer, which may then ask the existing device interface to relinquish control of the device to the newly created interface. | 2010-04-15 |
20100095311 | METHOD AND APPARATUS FOR FACILITATING A PERSISTENCE APPLICATION PROGRAMMING INTERFACE - One embodiment of the present invention provides a system for implementing a persistence application programming interface (API) that is platform independent and can make up-calls to business logic. During operation, the system receives a request at the API to execute a command at a persistence tier of an n-tier distributed application. In response to the request, the system determines an entity type for an entity affected by the command. Next, the system identifies a function at a middle tier of the n-tier distributed application that is associated with the entity type and the command, wherein the middle tier includes the business logic. The system then sends an instruction to the middle tier to execute the function. Finally, upon receiving a confirmation at the API that the function executed, the system executes the command at the persistence tier. | 2010-04-15 |
20100095312 | SLOT-IN TYPE DISK APPARATUS - It is an object of the present invention to provide a slot-in type thin disk apparatus having a sufficient clearance when a disk is inserted into and taken out from the disk apparatus, and capable of reliably attaching a disk to a spindle motor. | 2010-04-15 |
20100095313 | Optical Disk Transport Device for Optical Disk Playing Device - An optical disk transport device for optical disk playing device comprises: a delivery roll and an optical disk guiding device located at the optical disk insertion inlet; a pair of detection bars provided with detection parts contacting the periphery of the optical disk inserted from the optical disk insertion inlet, and the detection bars being capable of freely rotating around respective rotary pivots; a linkage plate for controlling the pair of detection bars to move together; an elastic part making the detection bars to rotate according to the direction that makes the detection parts to contact the periphery of the optical disk; and an optical disk baffle for stopping the transport of the small diameter optical disk as the center of the small diameter optical disk passing the center of the plummer; the detection parts of the pair of detection bars are located between the delivery roll and the plummer. The optical disk transport device utilizes simple structure, to implement that no matter what posture the playing device is at, it can all transport the small diameter optical disk to the plummer safely. | 2010-04-15 |
20100095314 | Optical Disk Loading Final Position Detection Device - An optical disk loading final position detection device comprises: an optical disk guiding device and a delivery roll located at the optical disk insertion inlet; a pair of detection bars provided with detection parts contacting the periphery of the optical disk of big diameter or small diameter inserted from the optical disk insertion inlet, and the detection bars being capable of freely rotating around respective rotary pivots; a support part, one end of the support part being rotatablely fixed to the upper base plate near the detection part of one detection bar, the middle of the support part being provided with an assorted part interacting with the detection bar; and a trigger bar, the middle of the trigger bar being rotatablely fixed to the free end of the support part, one end of the trigger bar being provided with a contact part for contacting the periphery of an optical disk, and the other end being connected to a control part. While the detection bars are rotating, the support part makes the trigger bar to move towards the direction directly facing the central line, so, the trigger bar will not extrude out of the maximum outer diameter of the optical disk along the optical disk transport direction, so as to implement miniaturizing the optical disk playing device. | 2010-04-15 |
20100095315 | STORAGE MEDIUM PLAYBACK DEVICE - Problem: A storage medium playback device includes a first playback means that plays back on the basis of information stored on a storage medium, a second playback means that plays back on the basis of information stored on a storage medium, and a single insertion slot through which a storage medium to be played back by the first playback means and a storage medium to be played back by the second playback means are inserted, wherein the storage playback device is capable of simultaneously playing back different storage media each with the first playback means and the second playback means; therefore, the area of an installation face for insertion slots is effectively used. | 2010-04-15 |
20100095316 | CONTENT TRANSMISSION SERVER AND CLIENT AND METHOD - A content transmission server and client and method which may implement the viewing of contents by concentrating all the contents into the storage/delivery-performing server, and performing the television broadcast, and which may make unnecessary the video-recording at user's own whereabouts, and may prevent the unauthorized copy and leakage-out onto an unauthorized network by making the on-server video-recording always available in a manner of the on-server right purchasing. | 2010-04-15 |
20100095317 | Determining User Attention Level During Video Presentation by Monitoring User Inputs at User Premises - In one embodiment, a method comprises identifying, by an apparatus at a user premises, a presentation of an addressable video stream to a user; detecting by the apparatus whether the user has supplied a user input, relative to the presentation, to at least one user input device; the apparatus selectively associating each user input detected relative to the presentation with a corresponding identified position of the addressable video stream; and generating, by the apparatus, a data structure enabling identification of an attention level by the user toward at least a portion of the addressable video stream, the data structure specifying an identifier for the addressable video stream and specifying whether the user supplied any user input relative to the presentation, including selectively adding to the data structure at least one user input and the corresponding identified position. | 2010-04-15 |
20100095318 | System and Method for Monitoring Audience Response - A system and method are provided for monitoring audience response to a display is disclosed. The method includes measuring audience response to the display by obtaining an electronic video stream at the display. Another operation tags the video stream based on changes in audience response measured at the display, and converts the tagged video stream into quantized audience response data at the display. The quantized audience response data may be processed into audience response analytics through statistical analysis at the display. | 2010-04-15 |
20100095319 | SYSTEM AND METHOD FOR MONITORING TELEVISION VIEWING USING KEYFRAMES - Embodiments of keyframe analysis and distribution from broadcast television are disclosed. For example, embodiments include methods and systems of sharing video frame data over a data network to provide features that may include improved program guides, parental or other monitoring of televisions or other video receivers, and sharing of user identified frames or scenes of video programs. | 2010-04-15 |
20100095320 | METHODS AND APPARATUS FOR IDENTIFYING AUDIO/VIDEO CONTENT USING TEMPORAL SIGNAL CHARACTERISTICS - Methods and apparatus for identifying audio/video content using temporal characteristics of a signal are disclosed. The disclosed apparatus and methods receive a signature associated with audio/video content presented at a monitored site, wherein the signature is based on a plurality of time intervals associated with audio features of the audio/video content presented at the monitored site and identify the audio/video content presented at the monitored site based on the received signature. | 2010-04-15 |
20100095321 | Digital Broadcast Recording/Reproducing Apparatus and Parental Control Method for Digital Television Program - This digital broadcast recording/reproducing apparatus includes a control portion performing parental control of a digital television program on the basis of rating information. The control portion is formed to recognize whether or not the rating information is updated from that at the time of recording of the digital television program when reproducing the recorded digital television program and to inquire of the user as to whether or not to perform parental control of the digital television program if the rating information is updated at the time of reproduction. | 2010-04-15 |
20100095322 | System for Interactively Distributing Information Services - An interactive information distribution system includes service provider equipment for generating an information stream that is coupled to an information channel and transmitted to subscriber equipment. The service provider also generates a command signal that is coupled to a command channel and transmitted to the subscriber equipment. The service provider also receives information manipulation requests from the subscriber via a back channel. A communication network supporting the information channel, command channel and back channel is coupled between the service provider equipment and the subscriber equipment. | 2010-04-15 |
20100095323 | SYSTEM AND METHOD FOR CONTENT DELIVERY WITH MULTIPLE EMBEDDED MESSAGES - A digital video program is obtained. The program includes: (i) at least one broadcast segmentation message specifying at least one location for at least one broadcast advertisement, and (ii) at least one time-shifted segmentation message specifying at least one location for at least one time-shifted advertisement. The program is broadcast with at least one broadcast advertisement in accordance with the at least one broadcast segmentation message, and is made available to a subscriber at a time after the broadcasting, with at least one time-shifted advertisement in accordance with the at least one time-shifted segmentation message. | 2010-04-15 |
20100095324 | Providing Conditional Advertising - Advertisements can be paired based on their context to achieve increased advertising effectiveness that might not be able to be achieved without the pairing. The advertisements can be paired based on a user's preferred context, which includes an attribute of one of the advertisements. For example, a conditional advertisement can be paired with a scheduled advertisement based on an industry type, the length of the other advertisement, or some other characteristic. Each characteristic can be given a weight, to aid in pairing determinations. The effectiveness of the pairing can be tracked, and the context can be iteratively modified based on the measured effectiveness of the advertising campaign. Pairing can be performed without identifying other advertisers, even though weighting factors may take a sponsor's identity into account. Pairing can be constrained by a master schedule and by a maximum allowed number of conditional spots. | 2010-04-15 |
20100095325 | USE OF MULTIPLE EMBEDDED MESSAGES IN PROGRAM SIGNAL STREAMS - A method of generating a program signal stream comprises creating a sequence of serial programs that include a first event and a second, later occurring event and inserting a plurality of messages in the sequence of serial programs, between the first event and the 5 second event. The messages may be indicative of a time to the second event, as measured from each respective message of an elapsed time since the first event, to each respective message. Alternatively or in addition, the messages may be at equal time intervals between the first event and second events. The first and second events may be the start and end of a program or a program portion, such as a chapter, an advertisement, unscheduled content or an 10 entire program, for example. At least one message indicative of the time to the second event may be inserted in the sequence of serial programs prior to the first event. | 2010-04-15 |
20100095326 | PROGRAM CONTENT TAGGING SYSTEM - A program content tagging system for facilitating the development of an interactive social network during the viewing of a program comprising a base station, a database, an output device, and an input device. The base station serves as the conduit for bidirectional communication between the user and the output device. The database stores a library of program content and/or other program content identification to provide a means for identifying the program content transmitted to the user. The output device allows the user to view any additional information synchronized with the program content. The input device allows the user to request or send information to the base station for processing. The user may activate a tag mark displayed on the output device to view additional information. With this information users, vendors, and visitors can engage in commerce through the use of advertisements and sales of goods and services. | 2010-04-15 |
20100095327 | TELEVISION APPARATUS AND CONTROL METHOD THEREOF - A television apparatus includes a plurality of receiving units. The television apparatus includes a first receiving unit configured to receive a channel which broadcasts a program whose video image is displayed on a display unit, a second receiving unit configured to receive a plurality of channels while the video image is being displayed, a program information management unit configured to store genre information about programs broadcasted on the plurality of channels, and a control unit configured to determine a periodic check order of receiving the plurality of channels based on the genre information about the programs read by the program information management unit and to control the second receiving unit to periodically check and receive the plurality of channels according to the periodic check order. | 2010-04-15 |
20100095328 | TECHNIQUE FOR CONTROLLING THE DOWNLOAD OF AN ELECTRONIC SERVICE GUIDE - A technique for controlling a download of an electronic service guide (ESG) for media content distribution services to a user device is proposed. First, a user behaviour related to the user device is monitored. Second, a ranking of fragments of the electronic service guide to be downloaded interactively onto the user device is determined, based on the monitoring. The download of one or more of the fragments to the user device is then initiated based on the ranking. This technique is particularly useful when a transmission capacity available for downloading fragments of the ESG is limited. | 2010-04-15 |
20100095329 | SYSTEM AND METHOD FOR KEYFRAME ANALYSIS AND DISTRIBUTION FROM BROADCAST TELEVISION - Embodiments of keyframe analysis and distribution from broadcast television are disclosed. For example, embodiments include methods and systems of sharing video frame data over a data network to provide features that may include improved program guides, parental or other monitoring of televisions or other video receivers, and sharing of user identified frames or scenes of video programs. | 2010-04-15 |
20100095330 | SATELLITE RECEIVER SYSTEM WITH RECHARGEABLE BATTERY AND ANTENNA SOLAR CELL - A satellite receiving system is constructed including an antenna, a solar cell, and a set-top box receiver. The set-top box receiver includes a rechargeable battery electrically coupled to the solar cell, and a main power supply. The solar cell is configured to charge the rechargeable battery. The set-top box is configured to operate from either the rechargeable battery or the main power supply, and to operate from the rechargeable battery when the main power supply is turned off. | 2010-04-15 |
20100095331 | Method and apparatus for performing template-based prefix caching for use in video-on-demand applications - A method and apparatus for performing template-based prefix caching advantageously identifies common prefixes (i.e., initial video segments) in video titles, stores common prefixes only once in a prefix cache, and uses these common prefixes when serving requests for video content. This advantageously enables a prefix cache to scale to a large number of video titles, since the cache stores each common prefix only once. A new video title that uses an already existing prefix may be advantageously added without requiring additional storage in the prefix cache. Template-based prefix caching also advantageously reduces the bandwidth required to distribute prefixes when new titles are ingested into the system—if the required template is already available in the prefix cache, prefix-caching is enabled instantly for this title and no additional bandwidth is required to distribute the prefix. | 2010-04-15 |
20100095332 | System and method for controlling media rendering in a network using a mobile device - A system and a method control media rendering in a network using a mobile device. The system and the method manage, control and/or render media in a home network using remote access and/or a remote user interface. The system and the method enable a user to control media rendering from multiple storage devices and/or multiple servers connected to the home network using the mobile device. The system and the method enable a user to control media rendering on multiple rendering devices connected to the home network using the mobile device. The system and the method have a control element hosted on a fixed, non-mobile device connected directly to the home network or connected to the home network as a stand-alone device. | 2010-04-15 |
20100095333 | MEDIA DEMAND AND PLAYBACK SYSTEM - A media system stores a plurality of media content items for transmission to a media receiver in response to requests for the items. The media system receives a request for a particular item and generates a playlist including the requested item. The media system adds at least one further media content item to the playlist and transmits the items to the media receiver for playback. A media receiver is also provided for playing back received items. The media receiver receives a playlist including the requested item and at least one preview secondary media content item provided at a playback position in the playlist before the requested item. The media receiver plays back the received items but user selection of a playback start position is disabled until the preview secondary media content item has been viewed in its entirety. | 2010-04-15 |
20100095334 | METHOD AND APPARATUS FOR PURCHASING UPGRADED MEDIA FEATURES FOR PROGRAMMING TRANSMISSIONS - The present invention provides an improved method and apparatus for purchasing media features for programming transmissions. A selection is sent to a server system to buy an upgraded media feature for a programming transmission. The server system automatically coordinates purchasing the media feature from a programming transmission source and providing the media feature from the programming transmission source. In one embodiment, an entertainment system includes a user interface from which a viewer selects an upgraded media feature for a programming transmission, wherein the programming transmission with the upgraded media feature is provided to the entertainment system. | 2010-04-15 |
20100095335 | SYSTEM AND METHOD FOR DISTRIBUTING VIDEO DATA OVER AN ELECTRICAL POWER LINE - A system is disclosed for performing a method of distributing video data over an electrical power line. The system includes but is not limited to a processor in data communication with a computer readable medium and a computer program comprising instructions embedded in the computer readable medium, the computer program further comprising instructions to detect first event data at a first controllable device in an internet protocol television system; instructions to send second event data over the electrical power line to a second controllable device in the internet protocol television system from the first controllable device in response to the detecting the first event data at the first controllable device; and instructions to receive video data concurrently at a first internet protocol television client device over the electrical power line from the first and second controllable devices in response to the detecting the first event data at the first controllable device. | 2010-04-15 |
20100095336 | METHOD AND APPARATUS FOR CREATING DVB-H SIGNAL HAVING DESIRED BIT RATE - A method of creating a DVB-H signal having a desired bit rate includes the steps of preparing a TS signal of DVB-H Standard in conformity to a first bit rate ( | 2010-04-15 |
20100095337 | METHOD AND SYSTEM FOR ACCESSING MEDIA CONTENT VIA THE INTERNET - A media storage and access system and methodology including a set-top box which receives and processes a plurality of signal sources and makes programming available locally through connected devices or via a data network such as a LAN, WAN, or the Internet. The system also integrates a multimedia storage system that allows programming content to be digitally stored. The system utilizes an integrated digital storage system and operating software to allow users to view a broadcast program (e.g., television, radio, etc.) with the option of instantly reviewing previous segments within the program. In addition, the system allows the user to store selected media programming while the user is simultaneously watching or reviewing another program. The system also allows stored media assets to be accessed locally via a media device connected to the unit or remotely via the Internet. | 2010-04-15 |
20100095338 | CABLE MODEM AND METHOD FOR UPDATING DIGITAL CERTIFICATES OF THE CABLE MODEM - A method for updating digital certificates of a cable modem (CM) sends a request packet to a certificate authority if the CM needs to update a current digital certificate. A feedback packet responsive to the request packet is obtained from the certificate authority. A new digital certificate contained in the feedback packet is written into a storage system of the CM to replace the current digital certificate. | 2010-04-15 |
20100095339 | Method and apparatus for designing a communication mechanism between embedded cable modem and embedded set-top box - The present disclosure discloses a digital communication between the between embedded cable modem (eCM) and embedded set-top box (eSTB) via a shared memory. The communication is carried out by packet transfer mechanism as per the protocol without adding any extra header overhead. The communication link is established between the eSTB and eCM mainly in layer 2 and partly in layer 1 according to an implementation of the OSI model. Further, eSTB is used as an eSAFE device coupled to eCM where the eCM and eSTB are considered to be placed on two SoCs with a separate CPU to each SoC (System-On-Chip) with a shared memory (via high speed data bus protocol). DMA (Direct Memory Access) engines are used to accelerate data transfer and to reduce load. DMA of only eCM, SoC is used to minimize hardware resources. | 2010-04-15 |
20100095340 | Medical Image Data Processing and Image Viewing System - A system enables a diagnosing physician to assess an effect of medical video clip data compression. A medical image data processing and image viewing system includes an acquisition processor for acquiring image data representing a sequence of reduced resolution medical images and corresponding full resolution medical images. An image navigation processor detects, a pause in user navigation through the sequence of reduced resolution medical images and continued presentation of a particular reduced resolution medical image of the sequence on a display. An acquisition control processor automatically initiates acquisition by the acquisition processor of data representing a full resolution medical image corresponding to the particular reduced resolution medical image for presentation on the display in response to a detected pause. A display processor initiates generation of data representing a composite display image including at least one of the particular reduced resolution medical image and the corresponding full resolution medical image. | 2010-04-15 |
20100095341 | METHOD OF PROVIDING DIGITAL TV APPLICATION - A method of providing a digital TV application is disclosed. In accordance with the method of the present invention, a transmission time and a loading time of the digital TV application and a limitation on a number and a size of the digital TV application are minimized, providing a personalized digital TV application based on a receiver information or a user information is possible. | 2010-04-15 |
20100095342 | WIRELESS CONTENT TRANSMISSION AND CONTROL - A wireless transmission system is provided. The wireless transmission system can include: (a) a receiver unit capable of being coupled to a display device; and (b) a transmitter unit that sends a wireless signal to the receiver unit, wherein the wireless signal comprises a bandwidth sufficient enough to carry high definition video content. Other embodiments are disclosed. | 2010-04-15 |
20100095343 | Audiovisual Apparatus, Method of Controlling an Audiovisual Apparatus, and Method of Distributing Data - According to one embodiment, an embodiment of this invention provides an audiovisual apparatus that enables a plurality of users to appreciate one program as if they were got together, and a method controlling the apparatus. In the audiovisual apparatus, the broadcast-program signal processing module processes the broadcast program signal received at the first reception module and outputs the broadcast program signal to the first display area. The grouped-video signal processing module processes the grouped video signal received at the second reception module and outputs the same, in the form of a multi-image, to the second display area. Meanwhile, the transmission module processes a pickup image signal and outputs the same to an external apparatus. | 2010-04-15 |
20100095344 | Ingress Noise Inhibiting Network Interface Device and Method for Cable Television Networks - Ingress noise from subscriber equipment is mitigated or prevented from reaching a cable television (CATV) network. All upstream signals including ingress noise are initially transmitted to the CATV network whenever their instantaneous power exceeds a threshold which typically distinguishes ingress noise from a valid upstream signal. Whenever the instantaneous power is below the threshold, ingress noise is blocked from reaching the CATV network. A gas tube surge protection device is included to resist component destruction and malfunction arising from lightning strikes and other high voltage, high current surges. | 2010-04-15 |
20100095345 | SYSTEM AND METHOD FOR ACQUIRING AND DISTRIBUTING KEYFRAME TIMELINES - Embodiments of keyframe analysis and distribution from broadcast television are disclosed. For example, embodiments include methods and systems of sharing video frame data over a data network to provide features that may include improved program guides, parental or other monitoring of televisions or other video receivers, and sharing of user identified frames or scenes of video programs. | 2010-04-15 |
20100095346 | SET-TOP BOX RECEIVER SOFT CONTROL SYSTEM AND METHOD - A set-top box is constructed including a processor, an input port, an auxiliary input port, and an output port. The input port is electrically coupled to the processor, and is configured to receive first control signals from a remote control. The auxiliary input port is also electrically coupled to the processor, and is configured to receive second control signals from an auxiliary remote control and send the second control signals to the processor. The output port is electrically coupled to the processor, and is configured to send graphical representations of a remote control to a display. The processor is configured to compose a graphical representation of the remote control, receive a second control signal, modify the graphical representation of the remote control in response to the second control signal, and send the graphical representation to the output port for display. | 2010-04-15 |
20100095347 | BROADCAST INTERACTIVE TELEVISION SYSTEM - A system that incorporates teachings of the present disclosure may include, for example, a system having a controller to deliver broadcast channels by way of interactive TV (iTV) edge routers using multicast virtual private networks, share a same multicast state for the broadcast channels and share a same multicast delivery tree for the broadcast channels. Other embodiments are disclosed. | 2010-04-15 |
20100095348 | SYSTEM AND METHOD FOR MANAGEMENT AND TRANSLATION OF TECHNICAL SECURITY POLICIES AND CONFIGURATIONS - A system and method translating information of a source policy configuration into a universal data type useable with a target policy configuration. The disclosed system and method provide comprehensive and highly automated translation of security policies and configurations into a normalized format, thereby enabling management and transformation of information across various types of technologies. Normalized data format is utilized to output data into different formats or data types. | 2010-04-15 |
20100095349 | Approach for Managing Access to Electronic Documents on Network Devices Using Document Retention Policies and Document Security Policies - An approach for managing access to electronic documents uses document retention and document security policies. In response to detecting a request to access a particular electronic document stored on a network device, a document retention policy and a document security policy are applied to the particular electronic document. If, based upon application of the document retention policy to the particular electronic document, a determination is made that the particular electronic document is to be deleted, then the particular electronic document is deleted from the network device. If, based upon application of the document security policy to the particular electronic document, a determination is made that access to the particular electronic document should be denied, then access to the particular electronic document is denied. Retention policy audits, automatic or manual loading or auto-destruction code and self-extracting and executable data may also be used to enforce document retention and document security policies. | 2010-04-15 |
20100095350 | UNIVERSALLY USABLE HUMAN-INTERACTION PROOF - Disclosed is a system and method for generating a universally usable, completely automated public turing test to tell a computer and a human apart (CAPTCHA). The universally usable CAPTCHA uses contextually related pictures and sounds to present concepts to a user. The pictures allow the CAPTCHA to be used by someone who could see, and the audio would allow the CAPTCHA to be used by someone who could not see. This combination of sound and images should make the CAPTCHA more universally usable for a larger population of users than previously known CAPTCHAs. | 2010-04-15 |
20100095351 | METHOD, DEVICE FOR IDENTIFYING SERVICE FLOWS AND METHOD, SYSTEM FOR PROTECTING AGAINST DENY OF SERVICE ATTACK - A method, device for identifying service flows and a method, system for protecting against a denial of service attack are provided. The method for identifying service flows includes: detecting a user access to a target system; dynamically generating a set of user identifier information according to the detected user access to the target system and a preset user access statistical model; when the service flow needs to be identified, extracting the user identifier information from the service flow; comparing the extracted user identifier information with the user identifier information in the set of user identifier information to determine whether they are matched; determining whether the service flow is legal service flow according to the comparison result. | 2010-04-15 |
20100095352 | Message Service Indication System and Method - Systems and methods for displaying messages to a user, the messages having different levels of security, are provided herein. One method of displaying to a user messages having different levels of security includes receiving a message over a network includes examining an attribute of the message to determine a security-related level associated with the message. A visual indication for display to a device user is generated by the device. Such visual indication is indicative of the determined security-related level, and is configured to be visible during scrolling through a majority of the message text. | 2010-04-15 |
20100095353 | SYSTEM AND METHOD FOR CONTENT ACCESS CONTROL - A system and method for managing access to content is provided. One example embodiment provides for a method including acts of identifying a filter of content based at least in part on the preferences a user and a subject presented in the content and presenting the content using the filter to the user. Another example embodiment provides for a system that includes a controller configured to identify a filter of content based on preferences of a user, to present content using the identified filter and to update the preferences of the user based on feedback from the user and the subjects presented in the content. | 2010-04-15 |
20100095354 | SECURE ACCESS OF ELECTRONIC DOCUMENTS AND DATA FROM CLIENT TERMINAL - An improved approach for secure access of electronic documents and data is provided. | 2010-04-15 |
20100095355 | INFORMATION PROCESSING APPARATUS AND INFORMATION PROCESSING METHOD - According to the present invention, a workflow desired by a user can be easily implemented without making any change or installing any application program in an image processing apparatus. An information processing apparatus includes a generation unit which generates setting information of a button related to execution of a work item, which is included in a screen displayed on an image processing apparatus according to a user, based on an activity corresponding to the work item and information of a user, who can execute the work item, acquired based on a role allocated to the work item, when the work item is generated that represents a work executed by a person in charge in an activity which is a work unit of a workflow executed in the image processing apparatus; and a transmission unit which transmits the setting information generated in the generation unit to the image processing apparatus. | 2010-04-15 |
20100095356 | SYSTEM AND METHOD FOR SETTING UP SECURITY FOR CONTROLLED DEVICE BY CONTROL POINT IN A HOME NETWORK - A system and method for setting up security of a controlled device by a control point in a home network are provided, in which authority to perform a function intended by a user is acquired through authentication between the control point and the controlled device, a security channel is created for performing the function, and a credential setting used by the user is synchronized among controlled devices in the home network. | 2010-04-15 |
20100095357 | Identity theft protection and notification system - An information monitoring and alert system is provided which registers subscribers and verifiers with a central alert system. The alert system provides an interface for the verifiers to submit queries relating to identification information. Information in this query is compared to the stored data submitted by the subscriber during registration and if a match occurs the subscriber is notified that the identification has been used for a certain purpose. The alert system only stores an encrypted value of the identification with only contact information which is preferably anonymous. Any other information is deleted after registration. The subscriber upon being alerted of the use of the identification is instructed to authorize or reject the transaction pertaining to the query. | 2010-04-15 |
20100095358 | Method and Base Station for Creating an Account in a Network Featuring a VoIP Protocol for DECT Mobile Parts - When registering a DECT mobile part (MT) with the base station (BS), the VoIP user ID (user) is formed from the DECT user ID (IPUI) according to a mapping rule and is used for registering an SIP account (SIPA). In addition, the SIP password (pw(AC)) is formed from the DECT authentication code (AC). Roaming or handover of DECT mobile parts (MT) in DECT systems featuring a VoIP connection can be accomplished in a simple manner by adjusting the DECT user ID (IPUI) to the SIP user ID (user (IPUI)) and adjusting the authentication code (AC) to the password (pw(AC)). The DECT mobile parts (MT) can continue to be used without change even when the same are connected to IP-oriented networks (IN), while said DECT mobile parts (MT) can be marketed for a wider range of uses. | 2010-04-15 |
20100095359 | Systems and Methods for Identifying a Network - Exemplary systems and methods for identifying a wireless network are provided. In exemplary embodiments, a method includes at least a digital device receiving network information associated with a network, generating an access identifier based on the network information, generating a credential request including the access identifier, providing the credential request to a credential server, receiving a credential request response from the credential server, the credential request response comprising network credentials to access the network, and providing the network credentials to a network device to access the network. | 2010-04-15 |
20100095360 | METHOD AND SYSTEM FOR AUTHENTICATION - A method and system of authenticating communications sessions between two or more parties over one or more simultaneous communications channels using one or more communicating devices is provided including having a first party create a first set of signatures, wherein the first set of signatures includes a signature for each communications channel, communicating with at a second party over at least one communications channel, whereby the second party authenticates the first party's signature associated with the at least one communications channel and accepts communication with the first party. | 2010-04-15 |
20100095361 | Signaling security for IP multimedia services - An apparatus in one example has: a predetermined tunnel that operatively couples a UE and a firewall; and the predetermined tunnel structured to convey at least signaling messages. The embodiments according to the present method and apparatus provide a solution for signaling security of IP multimedia services that is compatible with firewalls. For example, such embodiments establish an IPsec or SSL/TLS tunnel between the UE and the firewall, instead of an end-to-end IPsec or SSL/TLS connection between the UE and the CSCF. | 2010-04-15 |
20100095362 | Method and Arrangement for Handling Client Data - A method and arrangement for authorizing an initially unauthorized watching client to receive client data of an observed client from a client data server. The watching client sends an expanded request for client data to the server. The expanded request contains additional information such as a text string, a picture, or a video/audio clip. The server extracts the additional information and sends it to the observed client. The observed client can then decide whether to authorize the watching client to receive the observed client's data based on the additional information. | 2010-04-15 |
20100095363 | Method and System for Authentication Based On NASS - A method for authentication based on NASS is disclosed. UAAF authenticates the accessing of CNG. UAAF produces the management authentication credential between CNG and CNGCF, and sends the management authentication credential to CNGCF. CNG obtains the management authentication credential. CNG authenticates CNGCF by the obtained management authentication credential and CNGCF authenticates CNG by the management authentication credential. A system for authentication based on NASS is also disclosed. The authentication credential can be automatically produced, distributed and modified. And the operation cost is reduced and the operation efficiency is enhanced. | 2010-04-15 |
20100095364 | METHOD, APPARATUS AND COMPUTER PROGRAM PRODUCT FOR PROVIDING SMART CARD SECURITY - An apparatus for providing smart card security may include a processor. The processor may be configured to determine, for a mobile terminal locked to a smart card, whether a temporary subscriber identifier is being read from the smart card or whether the mobile terminal is receiving a new temporary subscriber identifier from a network in communication with the mobile terminal, compare a network identifier associated with the temporary subscriber identifier to a network identifier included in a permanent subscriber identifier associated with the smart card in response to a determination that the temporary subscriber identifier is being read from the smart card, compare a network identifier associated with the new temporary subscriber identifier to a network identifier associated with a previous temporary subscriber identifier in response to a determination that the new temporary subscriber identifier is received from the network, and determine whether to invalidate the temporary subscriber identifier or the new temporary subscriber identifier based on a result of a respective one of the comparing operations. | 2010-04-15 |
20100095365 | Self-setting security system and method for guarding against unauthorized access to data and preventing malicious attacks - A self-setting security guarding system and method for protecting against unauthorized access to data stored in a data processing apparatus, comprising setting various items used to guard data, wherein the items consist of protected areas with access control for data storage and access therein, authorized types of files with access controls, and access rules of safety regulations enabling the data processing apparatus to verify access to data contents stored therein or in the protected area thereof; and detecting access events of the protected area or types of files using the access control and generating a request for analysis when an access event is detected, and further analyzing whether the detected access event complies with the access rules and the analysis request to permit or deny execution of said access event depending on whether it complies or not with safety regulations. | 2010-04-15 |
20100095366 | Enabling Network Communication From Role Based Authentication - Network communications are secured on clients that do not have a user properly logged in and authenticated. The clients have transmit and/or receive functionality disabled. When a user logs into the client and is properly authenticated, the transmit and/or receive functionality is enabled. In some embodiments, the client can then download firewall policy information to prevent the client from communicating on certain ports or with certain clients. The firewall policy information may be specific to a role that a user logged into the client has. For example, administrators, executives and employee roles may each use different firewall policy information. | 2010-04-15 |
20100095367 | DYNAMIC ACCESS CONTROL POLICY WITH PORT RESTRICTIONS FOR A NETWORK SECURITY APPLIANCE - A network security appliance supports definition of a security policy to control access to a network. The security policy is defined by match criteria including a layer seven network application, a static port list of layer four ports for a transport-layer protocol, and actions to be applied to packet flows that match the match criteria. A rules engine dynamically identifies a type of layer seven network application associated with the received packet flow based on inspection of application-layer data within payloads of packets of the packet flow without basing the identification solely on a layer four port specified by headers within the packets. The rules engine is configured to apply the security policy to determine whether the packet flow matches the static port lists specified by the match criteria. The network security appliance applies the actions specified by the security policy to the packet flow. | 2010-04-15 |
20100095368 | HOME NODE B ACCESS CONTROL METHOD AND SYSTEM - A home Node B access control method provided herein includes: by a security access gateway, receiving access request information from a home Node B; forwarding the access request information to a network node capable of authenticating; and exercising access control for the home Node B according to the authentication result. A home Node B access control system is also provided herein. The method and the system for controlling the home Node B access ensure the security of the mobile network, stability of the wireless environment, and implementation of the operator policies. The access control is performed before the network allocates resources to the home Node B, thus avoiding waste of network resources and preventing unqualified home Node Bs from accessing the network. | 2010-04-15 |
20100095369 | Gateway Registry Methods and Systems - A gateway device for managing a set of two or more local management devices at a location. A system for networks at a plurality of locations. A method of operating a gateway device in a control network. A method for storing information to operate a gateway device in a control network. A method for storing information to operate a replacement gateway device in a control network. | 2010-04-15 |
20100095370 | SELECTIVE PACKET CAPTURING METHOD AND APPARATUS USING KERNEL PROBE - The present invention discloses a packet capturing method using a kernel probe, which is for capturing traffic generated only by a specific application. The packet capturing method using a kernel probe comprises the steps of: acquiring the 5-tuple information of a packet associated with the application to capture by intercepting a specific set of operating system networking kernel functions using a kernel probe which intercepts calls to the functions; capturing packets inputted and outputted through a network device; and identifying traffic generated by the application by comparing the 5-tuple information with 5-tuple information of the captured packets. | 2010-04-15 |
20100095371 | Visual authentication systems and methods - Methods for authenticating a user including presenting a series of images that are solely identifiable by the user, and that are not otherwise capable of being represented or expressed by the user, apart from the recognition thereof. Additionally, methods are provided that include the use of a gradient of morphed images created from a related set of initial images, including facial photos of various emotions that have been morphed into discernable images that are uniquely identifiable by a single user for use in authenticating the identification of that user by a secure system. | 2010-04-15 |
20100095372 | TRUSTED RELYING PARTY PROXY FOR INFORMATION CARD TOKENS - An apparatus can include a secret mapping module running on a machine and configured to create a mapping that maps a secret to a claim stored in an information card, a receiver running on the machine and configured to receive a request for the secret from a remote application, a mapping query module running on the machine and configured to perform a search for the mapping, a credential provider application running on the machine and configured to retrieve the secret based at least in part on the claim, and a transmitter configured to transmit the secret to the remote application. | 2010-04-15 |
20100095373 | System, Method and Program for Controlling Access Rights - A system for controlling access rights of artifacts having computer operated functions of a computer program includes an access control database which has policies that control access by a party to the artifacts in an application development environment. The system includes an access control environment having the artifacts. The system includes an access policy controller in communication with the access control database and the application development environment which implements the policies and controls access by the party to the artifacts being controlled. A computer program embodied on a computer readable medium for controlling access rights of a party during composition, design and execution includes a plurality of artifacts. At least a first of the plurality of artifacts having a part being modifiable by the party and operative with all other artifacts of the plurality of artifacts after being modified. A method for controlling access rights of artifacts having computer operated functions of a computer program includes the steps of requesting by a party a request to access to the artifacts in an application development environment. There is the step of controlling access by the party to the artifacts in the application development environment with policies in an access control database by implementing the policies with an access policy controller in communication with the access control database and the application development environment. An apparatus for controlling access rights of artifacts having computer operated functions of a computer program. | 2010-04-15 |
20100095374 | GRAPH BASED BOT-USER DETECTION - Computer implemented methods are disclosed for detecting bot-user groups that send spam email over a web-based email service. Embodiments of the present system employ a two-prong approach to detecting bot-user groups. The first prong employs a historical-based approach for detecting anomalous changes in user account information, such as aggressive bot-user signups. The second prong of the present system entails constructing a large user-user relationship graph, which identifies bot-user sub-graphs through finding tightly connected subgraph components. | 2010-04-15 |
20100095375 | Method for locating fraudulent replicas of web sites - A method for detecting Web sites used for phishing, including preselecting one or more Web sites to be examined for duplication, selecting at least one or more elements that are present in the preselected Web site and that relate to characteristic identifying features of the preselected Web site, forming at least one search query using the one or more elements, and submitting the at least one search query to an indexed public search engine. The elements illustratively may be URL substrings, content identification substrings, or tree structure-related substrings. A report of Web sites using the selected one or more search terms is received from the public search engine in response to the query, and the preselected Web site is eliminated from the Web sites found in the search. The remaining Web sites retrieved in the search are further analyzed, by additional focused searching of the retrieved pages, by comparing header or tree structure information, or other techniques to compare them with the preselected Web site to identify unauthorized near-replicas of the known legitimate Web site for responsive action. | 2010-04-15 |
20100095376 | SOFTWARE WATERMARKING - Various techniques for uniquely marking software, such as by reference to hidden information or other telltale features, are detailed. Some marks are evident in static code. Others are observable when the code is executed. Some do not manifest themselves until the code is exercised with specific stimulus. Different of the techniques are applicable to source code, object code, and firmware. A great number of other features and arrangements are also disclosed. | 2010-04-15 |
20100095377 | DETECTION OF SUSPICIOUS TRAFFIC PATTERNS IN ELECTRONIC COMMUNICATIONS - Methods and systems for detecting suspicious traffic patterns in electronic communications are provided. According to one embodiment, an electronic mail (email) message is received by a mail filter (milter), which evaluates a traffic pattern represented by the email message by scanning information associated with the email message and comparing it to information associated with one or more traffic analysis profiles. If the email message is identified by the milter as being inconsistent with normal email traffic patterns as represented by the one or more traffic analysis profiles, then the milter causes the email message to be handled in accordance with an email security policy associated with suspicious traffic patterns. For example, in the context of an outbound message, the originator may be alerted to a factor contributing to the identification and the originator may be provided with an opportunity to address the factor. | 2010-04-15 |
20100095378 | Classifying a Message Based on Fraud Indicators - Systems, methods, and media for classifying messages are disclosed. A plurality of fraud indicators are identified in the message. A signature of the message is generated. The generated signature of the message is compared to a stored signature. The stored signature is based on a statistical analysis of fraud indicators in a second message associated with the stored signature. A determination as to whether the message is fraudulent is made based on the comparison. The message is processed based on the determination that the message is a fraudulent message. | 2010-04-15 |
20100095379 | METHOD AND APPARATUS FOR DETECTING MALICIOUS CODE IN AN INFORMATION HANDLING SYSTEM - A method for detecting malicious code on an information handling system includes executing malicious code detection code (MCDC) on the information handling system. The malicious code detection code includes detection routines. The detection routines are applied to executable code under investigation running on the information handling system during the execution of the MCDC. The detection routines associate weights to respective executable code under investigation in response to detections of a valid program or malicious code as a function of respective detection routines. Lastly, executable code under investigation is determined a valid program or malicious code as a function of the weights associated by the detection routines. Computer-readable media and an information handling system are also disclosed. | 2010-04-15 |
20100095380 | DETECTION OF UNDESIRED COMPUTER FILES IN DAMAGED ARCHIVES - Systems and methods for an anti-virus detection module that can detect known undesired computer files in damaged archives that may be encrypted, compressed and/or password-protected are provided. According to one embodiment, a damaged archive file is received. And, without decrypting or decompressing the contents, an anti-virus detection module identifies a type and associated structure of the archive file by assuming each possible archive file type in turn and searching the archive file for descriptive information consistent with a current archive file type. Based thereon, descriptive information is obtained from the archive file describing one or more contained files within the archive file. Then, the descriptive information for each contained file is evaluated to determine if any contained files are malicious or undesired computer files. Finally, an attempt is made to prevent contained files determined to be a malicious or undesired computer file from being opened. | 2010-04-15 |
20100095381 | DEVICE, METHOD, AND PROGRAM PRODUCT FOR DETERMINING AN OVERALL BUSINESS SERVICE VULNERABILITY SCORE - A device, method, and program product are disclosed which are configured to receive, at a risk analysis engine, one or more business service models from a configuration management database, wherein the one or more business service models each comprises a set of configuration items, and wherein the one or more business service models each indicate a type of configuration item and a connectivity of the configuration item; send the set of configuration items to a vulnerability assessment tool; receive, from the vulnerability assessment tool, one or more vulnerability assessment scores for each configuration item within the set of configuration items; determine an overall business service vulnerability score for each of one or more business services based on the one or more business service models and the vulnerability assessment scores received from the vulnerability assessment tool; and output electronically the overall business service vulnerability score. | 2010-04-15 |
20100095382 | Real Invention - For this patent there is blocking of illegal theft sites at the search engine website address. Regularly updated theft sites are blocked and the website address search engine is updated with new program. Also covered under this patent although don't know if every claim is used or a few, is tagging of files (songs, movies, etc.). What this is, is every song downloaded on the internet comes with a tag and when synced to audio of movie device, if the song or movie is not tagged or certified not to be from a theft site than the song is not allowed on the sync page. Also covered (although don't know if going to be used) is the device whether it be a ipod, itv or something else, the device recognizes a tagged or untagged music, movie, etc. file. Don't know if this is going to be used. There is either universal tag or a tag strictly for one such device. For example just itunes songs for ipod. | 2010-04-15 |
20100095383 | Protection of Digital Data Content - Various embodiments include an apparatus, system, and method to control the distribution and usage of copyrighted digital content. The processing of a data file received over a communications network such as the Internet occurs both in a host digital appliance, such as a personal computer, notebook computer, audio player, video player, and the like, and in a very small digital rights management (DRM) module that is removably connected with the host. The processing makes it extremely difficult for the content of the data file to be obtained by an unauthorized person and/or utilized with an unauthorized DRM module. | 2010-04-15 |
20100095384 | Realest Invention - The new process (invention) named the realest invention is a new process in which information is stored on the computer. Information is stored in bulk at a policing agency. What this policing agency does is store drivers license, birth certificate and social security and others of this like. This enables for added security to the theft of music and movies on the internet. What the policing agency does is check to make sure that every thing is legate on the website individual is putting on the internet. Majority of times people use credit card and check and a thorough check can be done to make sure every thing matches on the website that they are putting on the internet. | 2010-04-15 |
20100095385 | Method And Device For Classifying And Processing Data In Instant Messaging System - The embodiment of this invention provides a method for classifying and processing data in an instant messaging system, which includes: classifying the data of every service included in the instant messaging system into confidential data and non-confidential data; obtaining and processing the non-confidential data of every service after a first authentication is passed successfully; and obtaining and processing the confidential data of every service after a second authentication is passed successfully. The embodiment of this invention also provides a device for classifying and processing data in an instant messaging system. According to the embodiment of the present invention, the security requirements of the instant messaging system are met, and the user is facilitated to use various services provided by the instant messaging system. | 2010-04-15 |
20100095386 | Realest invention - Music files that are downloaded from the internet are encrypted so that they are compatible with cd burning and allow music or movie files to be copied to disc a predetermined amount of time (either once or twice). Now disc burning programs only allow files (movies, music) from internet to be burned once or twice. These are the new ones that come out (disc burning programs). The old ones still operate the way they do unless running into newly encrypted files. | 2010-04-15 |
20100095387 | METHODS AND REAGENTS FOR SCREENING NEW DRUGS AND FOR TREATING ION PUMP ASSOCIATED DISORDERS AND DISEASES - The invention relates to fragments of a mammalian nervous system protein, agrin, and to their use as a screening and therapeutic agents in controlling neural activity associated with the function of the Na | 2010-04-15 |
20100095388 | Erythropoietin-Producing Organoid Precursor, Production Method Thereof, and Method For Treating Erythropoietin-Related Disorder - The subject of the present invention is to provide a means to producing an erythropoietin-producing organoid using mesenchymal stem cell derived from a mammal. It is a method for producing erythropoietin-producing organoid (organ-like structure) precursor, comprising the step of transplanting mesenchymal stem cell derived from a mammal into an embryo within a pregnant mammalian host or an embryo separated from a pregnant mammalian host to thereby induce the differentiation of the mesenchymal stem cell, in particular, a site to which the mesenchymal stem cell is to be transplanted is a nephrogenic site of the embryo, and a timing of transplantation corresponds to the stage in which a immune system of the host is still immunologically tolerant. | 2010-04-15 |
20100095389 | METHODS OF MAINTAINING GENETIC STABILITY OF INBRED ANIMAL STRAINS - The present invention provides novel methods of maintaining genetic stability of non-human animal inbred strains. In the methods, pedigree-tracked cryopreserved embryos derived from a foundation colony are produced and used to re-establish the foundation colony at appropriate intervals. | 2010-04-15 |
20100095390 | Aldolases, Nucleic Acids Encoding Them and Methods for Making and Using Them - This invention relates to polypeptides having aldolase activity, including pyruvate activity such as, without limitation, HMG and/or KHG aldolase activity, polynucleotides encoding these polypeptides, and methods of making and using these polynucleotides and polypeptides. In some embodiments, the invention is directed to polypeptides having aldolase activity, including pyruvate activity such as, without limitation, HMG and/or KHG aldolase activity, including thermostable and thermotolerant activity, and polynucleotides encoding these enzymes, and making and using these polynucleotides and polypeptides. The polypeptides in accordance with the invention can be used in a variety of pharmaceutical, agricultural and industrial contexts. In some embodiments, the invention provides polypeptides and biosynthetic pathways that are useful in the production of R-2-hydroxy 2-(indol-3ylmethyl)-4-keto glutaric acid (R-MP) and certain stereoisomers of monatin, such as R,R and S,R monatin, and salts thereof, as well as certain stereoisomers of monatin derivatives, such as the R,R and S,R configurations, and salts thereof. | 2010-04-15 |
20100095391 | REGULATION OF LIPID DROPLET FORMATION BY MODULATION OF FIT1 AND FIT2 AND USES THEREOF - This invention provides methods of regulating fat storage in tissue by modulating the levels of Fibrate Induced Transcript 1 (FIT1) and/or Fibrate Induced Transcript 2 (FIT2), as well as diagnostic screens for disorders and conditions involving regulation of fat storage in tissue, assays for identifying agents that can regulate fat storage in tissue through modulating the levels of FIT1 and/or FIT2, and genetically altered mammals in which expression of FIT1 and/or FIT2 is altered in one or more tissue. | 2010-04-15 |
20100095392 | Rice Hybrid XL745 - A rice hybrid designated XL745 is disclosed. The invention relates to the seeds of rice hybrid XL745, to the plants of rice hybrid XL745 and to methods for producing a rice plant produced by crossing the hybrid XL745 with itself or another rice plant. The invention further relates to hybrid rice seeds and plants produced by crossing the hybrid XL745 with another rice plant. This invention further relates to growing and producing blends of rice seeds comprised of seeds of rice hybrid XL745 with rice seed of one, two, three, four or more of another rice hybrid, rice variety or rice inbred. | 2010-04-15 |
20100095393 | METHOD FOR BREEDING TOMATOES HAVING REDUCED WATER CONTENT AND PRODUCT OF THE METHOD - A method for breeding tomato plants that produce tomatoes with reduced fruit water content including the steps of crossing at least one | 2010-04-15 |
20100095394 | STATISTICAL APPROACH FOR OPTIMAL USE OF GENETIC INFORMATION COLLECTED ON HISTORICAL PEDIGREES, GENOTYPED WITH DENSE MARKER MAPS, INTO ROUTINE PEDIGREE ANALYSIS OF ACTIVE MAIZE BREEDING POPULATIONS - This invention provides a novel means of predicting plant phenotypes that incorporates previously unusable dense marker data derived from historical pedigrees. The method operates by collecting information from a population pertaining to one or more loci, which is used to build one or more matrices by calculating, for the alleles present at the measured loci, the probability that the alleles are identical by descent. These matrices are then used to develop a second set of one or more matrices in which each value represents the probability that a certain individual in the population descended from a certain ancestral (founder) genotype. This set of second matrices can then be used as part of a breeding program for selecting and breeding individuals from the population or can be used to better classify the individuals in the population, leading to improved plant phenotypes. | 2010-04-15 |
20100095395 | GENETIC LOCI ASSOCIATED WITH NORTHERN LEAF BLIGHT RESISTANCE IN MAIZE - The invention relates to methods and compositions for identifying and selecting maize plants with enhanced resistance to | 2010-04-15 |
20100095396 | METHOD FOR INCREASING THE DRY BIOMASS OF PLANTS - The present invention relates to a method for increasing the dry biomass of a plant via increasing the carbon assimilation by treating a plant, a part of the plant, the locus where the plant is growing or is intended to grow and/or the plant propagules with at least one insecticide. The invention also relates to a method for increasing the biomass of the fruit of a plant via increasing the carbon assimilation, the fruit containing 5 to 25% by weight of residual moisture, based on the total weight of the fruit, by treating a plant, a part of the plant, the locus where the plant is growing or is intended to grow and/or the plant propagules with at least one insecticide. The invention further relates to a method for increasing the carbon dioxide sequestration from the atmosphere by treating a plant, a part of the plant, the locus where the plant is growing or is intended to grow and/or the plant propagules with at least one insecticide as described below. | 2010-04-15 |
20100095397 | Polynucleotides and methods for the improvement of plants - Methods are described for producing a plant with altered seed yield comprising transformation of a plant with a genetic construct including a polynucleotide encoding of a polypeptide with the amino acid sequence of SEQ ID NO: 1 or a variant or fragment thereof. Also provided by the disclosed methods are isolated polypeptides, polynucleotides, constructs and vectors useful for producing a plant with altered seed yield. The methods also provide plant cells and plants transformed to contain and express the polypeptides, polynucleotides and constructs. Plants produced by the disclosed methods are further provided. | 2010-04-15 |
20100095398 | Protection against environmental toxicity through manipulation of the processing of messenger RNA precursors - This invention describes the identification of pre-messenger RNA processing as a novel target of environmental stress caused by example of lithium and sodium toxicity. Overexpression of different types of proteins (or protein fragments) from different organisms but all involved in pre-mRNA processing, protects yeast from salt stress, which indicates that any stimulation of this process, independently of its mechanism, may counteract the toxic effects of mineral salts. A similar phenotype of tolerance to NaCl and to LiCl has been observed by overexpression of these types of proteins in transgenic | 2010-04-15 |
20100095399 | PROTEIN FOR USE IN MODIFYING ABIOTIC STRESS TOLERANCE IN YEAST - A method is presented for selecting and isolating nucleic acids capable of conferring tolerance or resistance to environmental stress conditions in plants or yeast. Furthermore, nucleic acids, the proteins they encode and their use for the production of plants or yeast with enhanced environmental stress resistance is disclosed. | 2010-04-15 |
20100095400 | Nucleic Acid Molecules and Other Molecules Associated with the Cytokinin Pathway - The present invention is in the field of plant biochemistry. More specifically the invention relates to nucleic acid sequences from plant cells, in particular, nucleic acid sequences from maize and soybean plants associated with the cytokinin pathway. The invention encompasses nucleic acid molecules that encode proteins and fragments of proteins. In addition, the invention also encompasses proteins and fragments of proteins so encoded and antibodies capable of binding these proteins or fragments. The invention also relates to methods of using the nucleic acid molecules, proteins and fragments of proteins and antibodies, for example for genome mapping, gene identification and analysis, plant breeding, preparation of constructs for use in plant gene expression and transgenic plants. | 2010-04-15 |
20100095401 | Grain Quality Through Altered Expression of Seed Proteins - The present invention is directed to compositions and methods for altering the levels of seed proteins in seed or grain. The invention is directed to the alteration of seed protein levels in plants, resulting in grain and seed with increased digestibility/nutrient availability, improved amino acid composition/nutritional quality, increased response to feed processing, improved silage quality, and increased efficiency of wet milling. The invention is further directed to nucleotide sequences encoding a sorghum delta-kafirin2 protein, sequences encoding a sugar cane delta prolamin2 protein, sequences encoding a sorghum LKR protein, and the amino acid sequences so encoded. Methods of using such sequences are also provided. | 2010-04-15 |
20100095402 | Materials and methods for engineering resistance to tomato yellow leaf curl virus (tylcv) in plants, - The subject invention concerns materials and methods for providing genetically-engineered resistance in plants to geminivirus, such as, using polynucleotides containing all or a portion of a replication associated protein (Rep) gene of TYLCV and all or a portion of a Rep intergenic region (IR). Virus-resistant plants produced according to the present invention have horticulturally acceptable phenotypic traits. Methods of the invention comprise transforming a plant with a polynucleotide wherein when the polynucleotide is expressed in the plant, the transformed plant exhibits resistance to plant viral infections. An exemplified embodiment utilizes a polynucleotide comprising a Rep gene derived from a Florida isolate of TYLCV. The methods of the invention can be used to provide resistance to TYLCV infection in plants such as tomato and tobacco. The present invention also concerns transformed and transgenic plants and plant tissue that comprise a polynucleotide of the invention. | 2010-04-15 |
20100095403 | PearlI1-Like Pathogen Control Genes and Methods of use in Plants - The invention provides pEARLI1-like polynucleotides which are capable of conferring increased nematode resistance to a plant. Also provided are inhibitory polynucleotides based on pEARLI1-like genes, which are capable of conferring resistance to necrotrophic fungi to plants. Specifically, the invention relates to transgenic plants, transgenic seeds, and expression vectors based on polynucleotides encoding pEARLI1-like genes, and methods of use thereof. | 2010-04-15 |