17th week of 2009 patent applcation highlights part 63 |
Patent application number | Title | Published |
20090106770 | SMS SESSIONING - A system, apparatus, and method are directed towards managing communications with global applications through message handlers. The message is received by a first message handler that is local to the client device. The first message handler determines if the message is to be forwarded to a global application, and if so, forwards the message to a second message handler, which is configured to be local to the global application. The second message handler forwards the message and receives a response from the global application. The second message handler may then generate a session identifier that is useable to manage its session data for the message/response. The session identifier is sent to the first message handler in lieu of sending the session data, such that the two message handlers manage separately their own session data for the session. The session identifier is useable to relate the separately managed session data sets. | 2009-04-23 |
20090106771 | System and Method for Providing a Memory Region or Memory Window Access Notification on a System Area Network - A system and method for providing a memory region/memory window (MR/MW) access notification on a system area network are provided. Whenever a previously allocated MR/MW is accessed, such as via a remote direct memory access (RDMA) read/write operation, a notification of the access is generated and written to a queue data structure associated with the MR/MW. In one illustrative embodiment, this queue data structure may be a MR/MW event queue (EQ) data structure that is created and used for all consumer processes and all MR/MWs. In other illustrative embodiments, the EQ is associated with a protection domain. In yet another illustrative embodiment, an event record may be posted to an asynchronous event handler in response to the accessing of the MR/MW. In another illustrative embodiment, a previously posted queue element may be used to generate a completion queue element in response to the accessing of the MR/MW. | 2009-04-23 |
20090106772 | Loop checking mechanism in a data processing system - The invention concerns a method, computing device, data processing system and computer program product for ensuring correct processing of data according to various system states. The system includes a first data processing module having a state control unit which blocks reception of data on input channels where a state message indicating a change from an old state to a new state has been received and sends a loop check message into each loop in a set of data processing loops the module is connected in and for which the old state applies. The state control unit also removes the blocking when for each loop in the set either the loop check message is received in the module or an associated input channel has received the new state and all other input channels have received the new state. | 2009-04-23 |
20090106773 | Method and system for user-friendly forwarding entry management based on inter-process communication - A method and system for user-friendly forwarding entry management based on inter-process communication (IPC) is provided. The system includes a function input unit inputting a command for forwarding entry management; and an automated process unit verifying parameters included in the function to create a user table, extracting information for creating a forwarding entry management table from the user table, and outputting a forwarding entry management message including the extracted information. The method includes inputting a command for forwarding entry management; verifying parameters included in the command; creating a user table using the parameters if the verification is successful; extracting information for creating a forwarding entry management table from the user table; and outputting a forwarding entry management message including the extracted information. | 2009-04-23 |
20090106774 | INTERPROCESS COMMUNICATION SYSTEM, INTERPROCESS COMMUNICATION CONTROL DEVICE, INTERPROCESS COMMUNICATION CONTROL METHOD, AND COMPUTER PROGRAM PRODUCT - An interprocess communication system comprising: a transmission device; and a reception device connected to the transmission device so as to be able to receive communication data via a network, wherein in the transmission device, a first process, to which a first thread and a plurality of other threads belong, is created, the first thread performing interprocess communication with outside and the plurality of other threads transferring the communication data to the first thread, in the reception device, a second process, to which a second thread and a plurality of other threads belong, is created, the second thread performing interprocess communication with outside and the plurality of other threads receiving the communication data transferred from the second thread, and the first thread transmits, to the second thread, the communication data containing information for identifying a destination thread, is disclosed. An interprocess communication control device and method are also disclosed. | 2009-04-23 |
20090106775 | Method, system and apparatus for a transformation engine for use in the processing of structured documents - Systems, methods and apparatuses for embodiments of a transformation engine for structured documents are disclosed. More specifically, instruction code may be generated by a compiler from transformation instructions for a structured document. Embodiments of the transformation engine may comprise hardware circuitry operable to execute the instruction code to process a structured document according to the transformation instructions such that output for an output document is generated. | 2009-04-23 |
20090106776 | Apparatus and method for managing events in virtual world - Provided is an apparatus for managing events in a virtual world. The apparatus includes: an event detecting unit monitoring a virtual world and detecting an event which occurs in the virtual world; a snapshot managing unit generating snapshots of developments of the event; and a control unit providing each of the generated snapshots in real time. | 2009-04-23 |
20090106777 | TYPICALITY FILTERING OF EVENT INDICATORS FOR INFORMATION TECHNOLOGY RESOURCES - A monitor for information technology resources improved by introducing typicality filters to analyze potential event indicators such as alerts. A typicality filter keeps a time-dependent history of the frequency of occurrence of an associated event, wherein time is segmented into monitoring periods. At the end of each monitoring period, a present count of occurrences of the event is determined, and compared with the numbers of occurrences of that event in a subset of monitoring periods read from the history. If the present count exceeds the number of occurrences of the event in a predetermined proportion of the subset of historical monitoring periods, a first action is invoked; otherwise, a second action is invoked. | 2009-04-23 |
20090106778 | METHOD, INTERFACE AND APPARATUS FOR DISCOVERING A LOCATION OF A DEVICE - A system, method, Application Programming Interface (API) and device for discovering a location of a device, for example, to provide location information for a Location Based Service (LBS). The device includes a memory, a display, and a processor operably coupled to the memory and the display. The processor may be arranged to provide a user interface (UI) on the display, retrieve location cues in response to a location request, forward location cues to a location server and receive location information back from the location server. The location information may be a location query page associated with a new place ID if the location cues do not correspond to the location server cues or the location information may be a previously discovered place ID associated with the server location cues if one or more of the location cues correspond to one or more of the server's location cues. | 2009-04-23 |
20090106779 | Method and System for Modeling of System Content for Businesses - A method and system of managing content at a network site can allow easier use by business users. A higher level of abstraction can be used to allow business users to create their own objects that may reference or contain other objects or records as managed by a content management system. Business users do not have to learn programming code in order to work those objects, which are content types. A graphical user interface (“GUI”) can be used to help the business users to create, modify, and delete content types. The GUI and the ability for business users to the create content types greatly shortens the time between receiving software to operate a network site and launching content at that network site. | 2009-04-23 |
20090106780 | METHOD AND SYSTEM FOR COMMUNICATING BETWEEN ISOLATION ENVIRONMENTS - A method and system for aggregating installation scopes within an isolation environment, where the method includes first defining an isolation environment for encompassing an aggregation of installation scopes. Associations are created between a first application and a first installation scope. When the first application requires the presence of a second application within the isolation environment for proper execution, an image of the required second application is mounted onto a second installation scope and an association between the second application and the second installation scope is created. Another association is created between the first installation scope and the second installation scope, an this third association is created within a third installation scope. Each of the first, second, and third installation scopes are stored and the first application is launched into the defined isolation environment. | 2009-04-23 |
20090106781 | Remote call handling methods and systems - Methods and apparatuses are provided for handling remote calls, for example, in a servicing system having a plurality of operatively coupled service instances, wherein a request is received by a service instance which identifies the request as being associated with a non-state-changing operation or a state-changing operation. When the operation is identified as being non-state-changing then request may be processed by the receiving service instance. When the operation is identified as being state-changing then request may also be provided to and processed by other service instances. | 2009-04-23 |
20090106782 | Auto balancing device and disc chucking device and disc driving device having the same - An auto-balancing device, and a disc chucking device and a disc driving device equipped with the auto-balancing device are disclosed. The auto-balancing device may include: a housing, which is coupled with a rotating body, and on which a boss is formed; multiple balancing members, which are rotatably supported by the boss, and in at least one of which a hole is formed; and a guiding roller, which is inserted in the hole, and which guides a movement of the balancing member. The auto-balancing device can be utilized to reduce noise and vibration for a rotating body during acceleration and deceleration and during high-speed rotations. | 2009-04-23 |
20090106783 | Electomagnetic field generating element, information recording/reproducing head and information recording/reproducing apparatus - The present invention provides an electromagnetic field generating element, an information recording/reproducing head, and an information recording/reproducing apparatus. The electromagnetic field generating element makes it possible to restrain magnetic field attenuation or magnetic field delay in a high frequency recording/reproducing head for use in thermally assisted magnetic field recording/reproduction using a near field. The information recording/reproducing head and the information recording/reproducing apparatus can carry out high frequency magnetic recording/reproducing. | 2009-04-23 |
20090106784 | SPINDLE MOTOR AND CLAMPING APPARATUS - Disclosed is a clamping apparatus including a case having a side surface on which a plurality of arm holes are formed; an arm, which moves inside and outside the case through one of the arm holes while being restricted by the case and has an upper part and a lower part that are guided by the case; and an elastic member installed inside the case to elastically support the arm. | 2009-04-23 |
20090106785 | System and Method for Approximating Characteristics of Households for Targeted Advertisement - According to one embodiment of the invention, a method of operation involves two operations. The first operation involves receiving feedback information from a viewing audience concerning a displayed video content. After receipt of the feedback, substituting portions of a downloaded data stream with video content selected based on the feedback information. | 2009-04-23 |
20090106786 | VIEWING BEHAVIOR LEARNING APPARATUS - A viewing behavior learning apparatus includes: a viewing history acquiring unit that acquires a viewing record that indicates an attribute of a program and start and end times during which a viewer viewed the program; a viewing history dividing unit that divides the viewing record every discretized time points that is discretized by a unit time; a viewing history replicating unit that discretizes a viewing time period denoted by the divided viewing records by interval shorter than the unit time to obtain discretized viewing time periods; a viewing behavior storage unit that builds a model of the viewing behavior by use of a Bayesian network having the viewing time period and the attribute as random variables and stores a conditional probability table of the Bayesian network; and a viewing behavior updating unit that updates the conditional probability table using the discretized viewing time periods. | 2009-04-23 |
20090106787 | Intelligent electronic program guide - A subscriber unit for use in a television system including a television network and transmitting apparatus for transmitting program schedule information, the subscriber unit including a receiving unit for receiving the program schedule information from said television network, an icon-based guide generator for producing a program guide including an icon-based hierarchical program guide including the program schedule information, and display apparatus for displaying the program guide, the icon-based hierarchical program guide including a plurality of hierarchically-arranged screens each including at least one icon. Related apparatus and methods are also disclosed. | 2009-04-23 |
20090106788 | Procedure for Authenticating a Digital-Content User - The invention concerns a method for authenticating a user possessing a right of access to a digital content via terminal equipment ( | 2009-04-23 |
20090106789 | METHOD AND APPARATUS FOR REPRODUCING MOVING IMAGE ACCORDING TO PARENTAL LEVEL IN USER APPARATUS - A method and an apparatus for reproducing a moving image according to a parental level are provided. In the method, a video frame stream is digital-processed, so that frames are detected. Whether a parental level is set in each detected frame is determined. When the parental level is set, a frame sequence number of a frame to be reproduced next is determined using a next frame sequence number set in the frame. | 2009-04-23 |
20090106790 | METHOD OF RECOVERING MISSED PARTS OF MOBILE TV BROADCASTS - To recover part of a program that was missed in Mobile TV, a mobile device receives a program during a first broadcast, and detects a corrupted segment of the program, then stores a first time and a second time of the corrupted segment detected during the first broadcast. The first time corresponds to a start of the corrupted segment and the second time corresponds to an end of the corrupted segment. Finally, a replacement segment is captured during a second broadcast of the same program or downloaded from a server according to the first time and the second time of the corrupted segment detected during the first broadcast. | 2009-04-23 |
20090106791 | METHOD AND APPARATUS FOR TRANSMITTING ADDITIONAL DATA RELATED TO BROADCASTING SERVICE, AND METHOD AND APPARATUS FOR RECEIVING ADDITIONAL DATA RELATED TO BROADCASTING SERVICE - Provided are a method and apparatus for transmitting section data and a method and apparatus for receiving section data. The method of receiving updated additional data from among additional data related to a broadcasting service includes: receiving an update information list including information regarding updates of the additional data; and receiving at least one of updated additional data based on the received update information list. | 2009-04-23 |
20090106792 | METHOD AND APPARATUS FOR ADVERTISEMENT AND CONTENT DISTRIBUTION WITH CUSTOMIZED COMMERCIAL INSERTION DURING CHANNEL CHANGE - A method, system, and computer readable medium of inserting advertisement media content into an Internet Protocol Television (IPTV) system comprises providing media content to a user comprises receiving a first multicast stream containing a first media content at a set top box, displaying the first media content on a display, transmitting a unicast request from the set top box to a remote location in response to a television channel change operation, receiving a second multicast stream containing a second media content at the set top box in response to the unicast request, the second multicast stream including at least one I-frame, and displaying the second media content on the user's display in real-time in response to receiving the at least one I-frame. | 2009-04-23 |
20090106793 | Multimedia Presentation Resumption within an Environment of Multiple Presentation Systems - With at least one implementation described herein, one or more viewers are able to watch the same source multimedia content at multiple locations within an environment (e.g., a household). With at least one implementation described herein, a viewer is able to resume watching such content at a new location (or “locus”) from the point that she bookmarked the content at an original location. This abstract itself is not intended to limit the scope of this patent. The scope of the present invention is pointed out in the appending claims. | 2009-04-23 |
20090106794 | Multidimensional Navigation on Television Monitors - A method of navigating between TV channels and the like and a number of stored events on a TV or monitor, where the TV channels are provided in a sequence of positions between which navigation takes place normally using a P+ and P− button on a remote control, and where one position provides access to the stored events. Navigation to the position will enable navigation between the stored events using other buttons or touch sensitive areas on the remote control. One event may be automatically provided when navigating to the position. | 2009-04-23 |
20090106795 | RECEIVING DEVICE, REBROADCAST CONTENT SCHEDULING DEVICE, RECEPTION STATE NOTIFYING METHOD, REBROADCAST CONTENT SCHEDULING METHOD, REBROADCAST CONTENT SCHEDULING SYSTEM, REBROADCAST CONTENT SCHEDULING PROGRAM, AND RECORDING MEDIUM - A rebroadcast content scheduling device receives reception state information and schedules rebroadcast content, where the reception state information includes content identification information for identifying content represented by the broadcast wave received by the receiving section and indicates that the reception defection occurred in the reception of the content. Thus, the rebroadcast content scheduling device can determine to rebroadcast, as the rebroadcast content, the content that was received with many reception defections. | 2009-04-23 |
20090106796 | METHOD AND SYSTEM FOR PROVIDNG SUBSCRIPTION DATA - Methods and systems for providing subscription data are described. Subscription data may be received from a subscription data source. The video content may be provided for presentation. A determination may be made of whether the subscription data is contextually relevant to the video content. The subscription data may be provided for presentation in accordance with the determination and the providing of the video content. | 2009-04-23 |
20090106797 | APPARATUS, AND ASSOCIATED METHOD, FOR PROVIDING PERSONALIZED CHANNEL CONTENT - A device for identifying preferred television programming, or other multi-media, content and providing the identified content on a personalized channel. An identifier identifies the preferred content through monitoring of the viewing habits of a viewer. Manual input of information is also permitted to identify, or edit, the preferred content and its viewing schedule. Once the preferred content is identified, the content is provided on a personalized channel. And when the viewer selects to view the personalized channel, the preferred content, preferred by the user is viewed by viewing the single, personalized channel. | 2009-04-23 |
20090106798 | CHARACTER STRING RECEIVING DEVICE, CHARACTER STRING TRANSFERRING DEVICE, CHARACTER STRING TRANSMITTING/RECEIVING SYSTEM, CONTENT RECEIVING TERMINAL-SPECIFIC SYSTEM LSI, NAME LIST SHARING SYSTEM, NAME LIST SHARING METHOD, AND CONTENT RECOMMENDING METHOD - A character string receiving device includes a reception unit for receiving character string data indicating a character string via unidirectional communication, and a character string processing unit for processing the character string data received by the reception unit. | 2009-04-23 |
20090106799 | METHOD OF SORTING BROADCAST CHANNELS AND DISPLAY DEVICE USING THE SAME - A method of sorting broadcast channels and a display device using the same enables a sorted broadcast channel search list to be edited for use in channel searching. The method includes steps of receiving a broadcast signal including broadcast station information corresponding to a plurality of broadcast channels; detecting broadcast station information for each broadcast channel; searching, with reference to a lookup table, for a priority of each broadcast channel corresponding to the detected broadcast station information; generating a user interface device including a broadcast channel search list arranged in the lookup table in accordance with the searched priority, the user interface device receiving from a user an editing command corresponding to at least one broadcast channel of the broadcast channel search list; editing the broadcast channel search list according to the received editing command; sorting the plurality of broadcast channels based on the edited broadcast channel search list; and storing the sorted broadcast channel search list in correspondence to the detected broadcast station information. | 2009-04-23 |
20090106800 | Controlling supplementary data channels using display state information - Controlling supplementary data channels using display state information involves processing, at a user device, a first broadcast signal having a content channel and a second signal having a supplementary data channel. The supplementary data channel is related to the content channel. The broadcast channel and supplementary channel are rendered to a user via the user device. The supplementary channel is at least partially rendered on a display of the user device. An event is determined that causes the display to be no longer viewable by the user. In response to determining the event, processing and rendering the supplementary data channel is ceased. The action of ceasing to process the supplementary data channel results in lowering power consumption of the user device. | 2009-04-23 |
20090106801 | CONTENT PROCESSING DEVICE AND CONTENT PROCESSING METHOD - Even when the content recording and transmitting device receives requests from content receiving and reproducing devices, the content processing device including a device contention resolving manager for resolving a device contention can resolve a contention between the content receiving and reproducing devices for the devices required for the processing to be executed according to the requests. The device contention resolving manager includes: a priority level setting unit holding base priority levels of the content receiving and reproducing devices; a priority level revision processing unit deriving the priority levels corresponding to the requests; and a device contention resolving processing unit which one of the requests to be a request to be accepted, according to a priority order of the requests assigned with the priority levels, and reproduces or transmits a content according to the determined request by using the device. | 2009-04-23 |
20090106802 | Methods and systems for streaming from a distributed storage system - Methods and systems for streaming from a distributed storage system. One method comprising the steps of receiving a content to be streamed or progressively downloaded; striping the content into small content fragments; distributing the content fragments to storage-and-computing elements according to a fragment distribution information prior to retrieving the content fragments from the storage-and-computing elements; obtaining the fragment distribution information by a retrieving storage-and-computing element; utilizing the fragment distribution information for determining from which of the storage-and-computing elements to retrieve, and retrieving the content fragments from the determined storage-and-computing elements so as to enable approximately instantaneous playing of the streaming content. | 2009-04-23 |
20090106803 | IPTV APPLICATION SYSTEM AND METHOD AND SYSTEM FOR PLAYING NEAR VoD PROGRAMS - An IPTV application system and a method and system for playing near video on demand (NVoD) programs. The system for playing NVoD programs includes: an IPTV application system, adapted to create NVoD channels and generate an NVoD channel table that contains attribute information indicating whether NVoD channels support time-shifting operations; an NVoD server that intercommunicates with the IPTV application system, adapted to play a program specified by an operator in a multicast and/or unicast mode following a scheduled timetable according to control of the IPTV application system. The present invention implements time-shifting under the NVoD state and adds to user experience under the NVoD state, and in addition, provides a new channel for operators to sell on-demand programs. | 2009-04-23 |
20090106804 | DETECTING AND PROCESSING CORRUPTED VIDEO RECORDINGS - Embodiments of the invention include a method that comprises recording broadcasted television content and determining if one or more segments of the content is corrupted. The method can also present a notification if the content is corrupted, where the notification can include indicia such as a pop-up window, an icon or symbol in a program guide screen or program recorded content screen, and/or an indicator on the DVR unit. The method can also acquire uncorrupted content to replace one or more segments of the corrupted content. | 2009-04-23 |
20090106805 | Providing a Blade Center With Additional Video Output Capability Via a Backup Blade Center Management Module - A blade center is provided with an additional video output system which includes additional video output capabilities to allow a user to point to another blade within the blade center to work locally on a blade that does not include media tray access. The local access is granted via a control (e.g., a button) on the control panel of the blades or a control on the chassis or management module that allows the user to specify which blade to use for the second video output connection to a KVM console or direct host connect. This video output system advantageously allows more than one blade to be interactively utilized in a graphic environment at any time. Other blades executing local applications can be accessed and/or modified while another blade is accessing the media tray for installations and using one of the video output controls. | 2009-04-23 |
20090106806 | Broadcast receiver and system information processing method - A broadcast receiver and a system information processing method are disclosed. The broadcast receiver includes a receiver for receiving entitlement management message (EMM) transfer information including information for reception of an EMM over a cable, a network interface for transmitting and receiving data over Internet, and a controller for parsing the received EMM transfer information to determine whether the EMM is applied, and, when the EMM is applied, identifying a transfer method included in the EMM transfer information and controlling the EMM reception through at least one of the receiver and network interface based on the identified transfer method. | 2009-04-23 |
20090106807 | Video Distribution System for Switching Video Streams - Provided is a video distribution system including: a video server for transmitting a plurality of video streams; and a video gateway for transferring at least one of the plurality of the transmitted video streams to a video client. The video server adds a first identifier for identifying whether data of an independently decodable unit included in the video stream corresponds in time to the video stream; and transmits the video stream to which the first identifier has been added. The video gateway specifies, based on first identifiers added to the transmitted plurality of video streams, the data of the independently decodable unit of the video stream transferred after switching in a case where the video stream is switched to another video stream in the independently decodable unit; and transfers the video stream transferred after the switching from the specified data of the independently decodable unit. | 2009-04-23 |
20090106808 | INTERACTIVE MEDIA PRESENTATION SYSTEM FOR PRESENTING BUSINESS DATA OVER A DIGITAL TELEVISION NETWORK - The method includes steps for creating and updating an interactive television application, which includes business data and other interactive and dynamic data which changes frequently over time. The interactive television application and data is transmitted over a television broadcast network, and the method includes steps for presenting the data to the user. Business data is compiled into a binary form, the business data for example comprising descriptions of products. A description of an interactive application is generated using an authoring tool. The authoring tool allows a creative designer to create page layouts and use simple script to specify how to respond to user interactions. The compiled business data and the script are streamed to a receiver for generating video information for a user's television, wherein the receiver uses the script to access the compiled business data and generate a presentation of the data for the user. The receiver can be a set-top box for use with a cable television provider, a terrestrial television provider or a satellite television provider. The business data can be compatible with a version of XML (extensible markup language). The business data can be referenced within script created using an authoring tool without the instances of the business data being present at the time of authoring. The compiling can be configured to improve the access speed of the receiver to the business data and to reduce a memory footprint of the business data on the receiver. The business data can be updated and recompiled without requiring the application to be re-authored manually. | 2009-04-23 |
20090106809 | SYSTEM FOR FAULT DETECTION IN AN INTERNET PROTOCOL TELEVISION COMMUNICATION SYSTEM - A system that incorporates teachings of the present disclosure may include, for example, an Internet Protocol Television (IPTV) network element can have a wireless transceiver, a wireline transceiver, and a controller. The controller can be adapted to process multimedia signals received from an upstream IPTV network element, transmit the processed multimedia signals to one or more downstream IPTV network elements, monitor communications on a wireline interface capable of accessing a fault management system (FMS), and cause the wireless access transceiver to wirelessly transmit to the FMS telemetry information collected responsive to detecting one or more faults in the wireline interface. The controller can also cause the wireline transceiver to transmit to the FMS over the wireline interface the telemetry information responsive to detecting no fault in the wireline interface that impedes communication with the FMS over the wireline interface. Other embodiments are disclosed. | 2009-04-23 |
20090106810 | Ultra wideband communications protocols - A distributed reservation protocol for medium access control in a multiband OFDM ultrawideband communications network having a band group comprising a plurality of transmission bands, a device in said network having a mode in which it uses a selected one of said bands to communicate, and a band hopping mode, and wherein the protocol comprises allowing a device in a group of devices to make a combined time-frequency reservation, said time-frequency reservation comprising a reservation of a combination of a subset of said bands in a said band group and one or more data communications timeslots in which the device is allowed to use said reserved band for data communications such that multiple said devices in said group are able simultaneously to use one or more of the same or overlapping said reserved timeslots in different reserved frequency bands of said band group. | 2009-04-23 |
20090106811 | INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, PROGRAM, AND RECORDING MEDIUM ON WHICH SUCH PROGRAM IS RECORDED - Disclosed is an information processing apparatus that includes an obtaining unit obtaining first contents and second contents, a storage storing the first contents and second contents obtained by the obtaining unit, and an information processor reading the first contents and second contents from the storage and outputting the second contents, while causing the second contents to precede the first contents a predetermined time, to be superimposed on the first contents. | 2009-04-23 |
20090106812 | PROCESSING DIFFERENT COMPLEMENTARY STREAMS OF A PROGRAM - Methods and systems for the efficient and non-redundant transmission of a single video program in multiple frame rates, optionally employing a combination of video coding standards, in a way that is backwards-compatible with legacy receivers only supportive of some subsection of frame rates or of some subsection of video coding standards. | 2009-04-23 |
20090106813 | DIGITAL BROADCAST TRANSMITTER/RECEIVER HAVING AN IMPROVED RECEIVING PERFORMANCE AND SIGNAL PROCESSING METHOD THEREOF - A digital broadcast transmitting/receiving system, and a signal processing method thereof, includes a randomizer for randomizing a transport stream into a specified position of which stuff bytes are inserted, a stuff-byte exchanger for replacing the stuff bytes included in data output from the randomizer with specified known data, an RS encoder for performing an RS-encoding of data output from the stuff-byte exchanger, an interleaver for interleaving data output from the RS encoder, a trellis encoder for performing a trellis encoding of data output from the interleaver, an RS parity generator for generating a parity by performing an RS encoding of data output from the RS encoder, and outputting the generated parity to the trellis encoder, and a modulator/RF converter for modulating data output from the trellis encoder and performing an RF up-converting of the modulated data. The digital broadcast receiving performance can be improved even in an inferior multi-path channel by detecting the known data from the received signal and using the known data for synchronization and equalization in a digital broadcast receiver. | 2009-04-23 |
20090106814 | ERA-DEPENDENT RECEIVING AND PROCESSING OF PROGRAMS WITH ONE OR MORE VIDEO STREAMS - Methods and systems for the efficient and non-redundant transmission of a single video program in multiple frame rates, optionally employing a combination of video coding standards, in a way that is backwards-compatible with legacy receivers only supportive of some subsection of frame rates or of some subsection of video coding standards. | 2009-04-23 |
20090106815 | METHOD FOR MAPPING PRIVACY POLICIES TO CLASSIFICATION LABELS - A method and system are disclosed for mapping a privacy policy into classification labels for controlling access to information on a computer system or network, said privacy policy including one or more rules for determining which users can access said information. The method comprises the steps of parsing said one or more rules of the privacy policy; sorting the one or more rules into one or more sets; and, for each set of rules, (i) forming a logical statement from the rules of said each set, and (ii) using said logical statement to create associated privacy labels that allow access to said information. In a preferred embodiment, each of the rules is associated with a user category, a data category and a purpose category; and the rules in each set of rules have the same user category, the same data category, and the same purpose category. | 2009-04-23 |
20090106816 | INFORMATION PROCESSING APPARATUS, CONTENT PROCESSING METHOD, AND COMPUTER PROGRAM PRODUCT THEREOF - When a conflict occurs among usage rules for content data, a verification on the content data is made in accordance with the conflict solution policy defined in the usage rule for each of the content data. Available content data are determined in correspondence with a combination of grant verification results individually made on the content data. | 2009-04-23 |
20090106817 | SECURITY MANAGEMENT APPARATUS, SECURITY MANAGEMENT SYSTEM, SECURITY MANAGEMENT METHOD, AND SECURITY MANAGEMENT PROGRAM - A security management apparatus is capable of taking various security measures while referencing machine information and hence excellent in flexibility and widely applicable. The apparatus includes a security diagnostic unit for making a security diagnosis on the basis of security information obtained from a security information providing apparatus for providing information concerning security in a network and further on the basis of machine information obtained from at least one network machine connected to a network to judge a type of security-related processing to be executed for the network machine and also judge whether or not the security-related processing needs to be executed. A security execution unit executes predetermined security measure processing for the network machine on the basis of a result of diagnosis made by the security diagnostic unit. | 2009-04-23 |
20090106818 | SELECTIVELY AUTHORIZING SOFTWARE FUNCTIONALITY AFTER INSTALLATION OF THE SOFTWARE - Controlling access to functionality within an installed software product. The invention includes an authorization module that dynamically references authorization information when specific functionality is requested by a requesting entity such as a user or an application program to determine if the requested functionality is authorized to be executed. Further, the invention dynamically provides an opportunity to the requesting entity to purchase unauthorized functionality. In this manner, functionality within the software product may be enabled or disabled at any time (e.g., during installation, post-installation, and re-installation). | 2009-04-23 |
20090106819 | METHOD AND SYSTEM FOR PROVIDING, USING RIGHTS DESCRIPTION - A method for providing rights description includes generating a rights expression for controlling the use of digital contents, where the rights expression uses a parameter constant to describe permission and constraint of the rights and uses a parameter variable to describe consumption state information of the rights, and providing the terminal device with the rights expression. A method for using rights description includes obtaining the rights expression for controlling the use of digital contents, transferring the value of the rights consumption state to the corresponding parameter variable in the rights expression, executing the rights expression to obtain the remaining consumption state information of the rights, and using the digital contents according to the remaining consumption state information. The disclosure also discloses a server, a terminal device, and a DRM system. The technical solution under the present disclosure extends the rights description language without upgrading the terminal device and sets the logic relations between different rights items flexibly. | 2009-04-23 |
20090106820 | SYSTEM AND METHOD FOR USER AUTHENTICATION BASED ON ODOR RECOGNITION - A system for a user authentication includes an odor sensor unit for sensing an odor of a user's body to generate an odor biometric information vector, and a learning unit for performing an initial learning using the odor biometric information vector to generate a comparative odor biometric information vector. An authentication unit performs the user authentication by comparing an odor biometric information vector of the user's body to be authenticated from the odor sensor unit with the comparative biometric information vector if the user authentication is required. The authentication unit further performs an incremental learning of the comparative odor biometric information vector using the odor biometric information vector used in the authentication to create an incrementally learned odor biometric information vector. The comparative odor biometric information vector is updated with the incrementally learned odor biometric information vector. | 2009-04-23 |
20090106821 | CALL LIMITER FOR WEB SERVICES - Embodiments of methods, apparatuses, devices and systems associated with web services are disclosed. | 2009-04-23 |
20090106822 | Using social networks while respecting access control lists - Techniques are described for use with social networks and associated access information, such as access control lists, indicating which users are allowed to access the social networks. The social networks represent relationships between users. The social networks and access control lists may be represented in a graph which is traversed in connection with performing different operations using the social networks. | 2009-04-23 |
20090106823 | System and method for remote access data security and integrity - A system and method for locating and accessing remote data over a computer network that provides data security and integrity. The system includes at least one data server located in a first region, at least one data server located in a second region, a first indexing and network management server providing authentication services for the at least one data server located in the first region, a second indexing and network management server providing authentication services for the at least one data server located in the second region, and a central registration server providing authentication services to the first and second indexing and network management servers, including maintaining valid public key certificates for each indexing and management server. A local server is authenticated by its regional indexing and management server, which provides an authentication passport to indexing servers, on behalf of the local server. Thus, a local server can be authenticated to remote data servers and can request information from the remote data servers. Methods of authentication and data integrity are also provided. | 2009-04-23 |
20090106824 | Method of Securing Access to a Proximity Communication Module in a Mobile Terminal - A method of securing access to a near-field communication module ( | 2009-04-23 |
20090106825 | SYSTEM AND METHOD FOR USER PASSWORD PROTECTION - A system and method are disclosed for protecting a password assigned to a user, the method comprising: providing a password entry screen having a virtual keyboard, the virtual keyboard including a plurality of character keys arranged in a non-QWERTY format; authenticating the user if a password submitted by the user accessing the password entry screen matches a user password retrieved from a password database; and denying access to the user if the submitted password does not match the retrieved user password. The system comprises a storage module and a computer program for performing the method. | 2009-04-23 |
20090106826 | METHOD AND SYSTEM FOR USER AUTHENTICATION USING EVENT TRIGGERED AUTHORIZATION EVENTS - According to one aspect of the invention, authorization events trigger authentication requests for a user during the course of a computer session. In one example an authorization event trigger occurs as a user navigates through a web interface. In one embodiment, a user authenticates him or herself to enter a secure site. During the course of navigation through the secure site, authentication events are triggered. Authorization events occur when, for example, the user wishes to perform some action associated with the secure site or provide comment on information obtained from the secure site or obtain information from the secure site. The act of submitting or taking some action comprises a triggering event. In response to a triggered authorization request, a system related to the secure site (or the same system) generates authentication information, in one example, as a one-time password (OTP) that is transmitted to the user. The hardware/software necessary to accomplish the generation of a secure OTP resides with the provider hosting the secure site, although one should appreciate that the OTP generation may be delegated to another site or received as a service from a third party. In one embodiment, the user receives the OTP in the form a page to a pager. With respect to the medical field, a physician may be required to maintain a pager and liability can result from its loss or absence. In one example, such a requirement can be leveraged to provide additional layers of security where patient data is accessible over networks, and in one example over the Internet. Authorization event triggers are also used in conjunction with a system that does not require an authenticated user before reaching the authorization event triggers. Such environments can include a medical services/treatment environment, a financial services environment, and an information brokerage service environment. | 2009-04-23 |
20090106827 | SYSTEM AND METHOD FOR USER PASSWORD PROTECTION - A system and method are disclosed for protecting a password assigned to a user, the method comprising: providing a password entry screen having a virtual keyboard, the virtual keyboard including a plurality of character keys arranged in a non-QWERTY format; authenticating the user if a password submitted by the user accessing the password entry screen matches a user password retrieved from a password database; and denying access to the user if the submitted password does not match the retrieved user password. The system comprises a storage module and a computer program for performing the method. | 2009-04-23 |
20090106828 | DEVICE ADMINISTRATION APPARATUS, DEVICE ADMINISTRATION METHOD AND RECORDING MEDIUM - A device administration apparatus includes an apparatus information obtainer that obtains via a network, apparatus information stored in a device, a judger that judges whether or not the device is an administration object based on the obtained apparatus information, and an administrator that administers use of the device, if the judger judges that the device is an administration object. | 2009-04-23 |
20090106829 | Method and system for electronic reauthentication of a communication party - The present invention relates to a method for electronic reauthentication of a communication party ( | 2009-04-23 |
20090106830 | Secure Network Communication System and Method - A secure network communication system and method for secure data exchange using transmission control protocol are disclosed. The system provides for data exchange using between a client and a server, by way of an agent and a broker interconnected to exchange data over an unsecured network link. Upon receipt of a control packet from the client, the broker forwards a modified control packet to the agent using a secure protocol. The agent then inspects the modified control packet and forwards it to the server. Upon receipt of a response packet from the server, the agent forwards the response packet to the broker using a secure protocol and upon receipt of the response packet, the agent modifies the response packet and forwards it to the client. In the case that the exchange of control packets indicates establishment of a TCP session, the agent and the broker establish a data channel between themselves to create a transparent TCP channel between the client and the server. | 2009-04-23 |
20090106831 | IPsec GRE TUNNEL IN SPLIT ASN-CSN SCENARIO - An Internet Protocol Security (IPsec) protected Generic Routing Encapsulation (GRE) tunnel is established between the Access Service Network (ASN) and Connectivity Service Network (CSN) of a Simple IP network. A GRE layer is inserted between the user plane and the IP transport plane, and a GRE key is used to differentiate each user session. The IPsec protected GRE tunnel may be used to provide full Dynamic Host Configuration Protocol (DHCP) configuration support. It may also used to provide broadcast/multicast support, as well as non-IP traffic support. The GRE key may consist of a first half key and a second half key; the first half key may be allocated by a first node, and the second half key may be allocated by a second node. | 2009-04-23 |
20090106832 | COMPUTER SYSTEM AND PROGRAM CREATING DEVICE - A mobile telephone | 2009-04-23 |
20090106833 | ELECTRONIC APPARATUS WITH PERIPHERAL ACCESS MANAGEMENT SYSTEM AND METHOD THEREOF - A method for managing access authorization of peripherals of an electronic apparatus is provided. The method includes the step of: providing a data storage for storing a peripheral registry table which stores hardware IDs of the peripherals; reading the hardware ID of the peripheral when the peripheral is connected to the electronic apparatus; determining whether the hardware ID is recorded in the peripheral registry table; activating an access of the peripheral when the hardware ID is recorded in the peripheral registry table; and registering the hardware ID of the peripheral into the peripheral registry table when the hardware ID is not recorded in the peripheral registry table. | 2009-04-23 |
20090106834 | SYSTEMS AND METHODS FOR ENHANCING SECURITY BY SELECTIVELY OPENING A LISTENING PORT WHEN AN INCOMING CONNECTION IS EXPECTED - The present solution reduces the attack surface of a server by selectively opening a server port for listening when a client has been authenticated/authorized via another machine or process, and directed to connect to the server in question. When not selectively listening on a port, the server does not listen or open ports for connections or otherwise minimizes the number of open ports. By selectively listening for connections, the server reduces the opportunity for hackers to attack the server process, and improves the security of the server. The ability to selectively listen on a port at specific times may be combined with additional meta information—like ticketing and prior authentication information to help further secure the server. The meta information may identify and ensure that only the correct remote endpoint is allowed to connect via the port. Instead of first listening for connections and then authenticate and authorize the received connection as with typical servers, the present solution first authenticates/authorizes a connection via another machine or process, then listens for an expected and authorized connection. | 2009-04-23 |
20090106835 | METHOD AND APPARATUS FOR PROTECTING SENSITIVE INFORMATION ON A PUBLICLY ACCESSED DATA PROCESSING SYSTEM - The illustrative embodiments described herein provide a computer implemented method, apparatus, and computer program product protecting sensitive information on a data processing system. A determination is made as to whether a data processing system is publicly accessed. Responsive to determining that a data processing system is publicly accessed, the system identifies sensitive information. The data processing system monitors for the presence of sensitive information. Responsive to detecting the presence of the sensitive information, the system presents a warning to a user of the data processing system. | 2009-04-23 |
20090106836 | Equipment Monitoring Device - An equipment monitoring server is provided to prevent wrong acts in a local area network. An equipment monitoring server | 2009-04-23 |
20090106837 | Module for Controlling Integrity Properties of a Data Stream - A module for controlling integrity properties of a data stream input into a device, such as a machine for manufacturing or a management system related to such machines. A plurality of control items are registered in a database. At least one activable control means executes a control of one integrity property according to one of several registered control items. A list is attached to the database with selectable links for activating at least one of the control means. Configuration means perform on at least one of the links a chronological selection according to a predefined management profile on integrity properties of the data stream in order to introduce a selectable relative time delay between activations of control items. Due to that configuration, the integrity control thus obtained is provided with high reliability as well as in a very flexible manner. | 2009-04-23 |
20090106838 | Blocking Intrusion Attacks at an Offending Host - A method, apparatus, and program product are provided for protecting a network from intrusions. An offending packet communicated by an offending host coupled to a protected network is detected. In response to the detection, a blocking instruction is returned to the offending host to initiate an intrusion protection operation on the offending host, where the blocking instruction inhibits further transmission of offending packets by the offending host. At the offending host, a blocking instruction is received with a portion of an offending packet. The offending host verifies that the offending packet originated from the host. In response to the verification of the offending packet originating from the host, an intrusion protection operation is initiated on the host thereby inhibiting transmission of a subsequent outbound offending packet by the host. | 2009-04-23 |
20090106839 | METHOD FOR DETECTING NETWORK ATTACK BASED ON TIME SERIES MODEL USING THE TREND FILTERING - Method for detecting network attack based on time series model using the trend filtering. The method has the steps of: a) removing a trend component from the time series data to extract a residual component; and b) detecting an anomaly by applying a time series model to the residual component. | 2009-04-23 |
20090106840 | Certification Of E-Mails With Embedded Code - Certification of embedded content in e-mail is provided. A sender wishing to have code certified for inclusion in e-mail sends the code to a token authority. A code verification engine acting automatically or in conjunction with an analyst examines the code to determine whether it poses a risk of harm to e-mail recipients. If not, the token authority issues a certificate for the embedded content. The mail sender sends e-mail to recipients including the embedded content, and the certification is sent in conjunction with the content itself. A mailbox provider inspects the received e-mail to determine whether it includes embedded content and, if so, whether a certification is attached that the embedded content is not harmful. If not, or if the message includes uncertified content in addition to certified content, then the message is rejected, or delivered with a warning that certification is not present. | 2009-04-23 |
20090106841 | TRAFFIC MANAGER FOR DISTRIBUTED COMPUTING ENVIRONMENTS - Techniques suitable for facilitating communications between various computer programs operating on various nodes in a distributed computing environment are disclosed. The techniques can be used by a traffic manager operating in such environments. The traffic manager is capable of monitoring traffic exchanged between client and server programs operating in the distributed computing environment. Moreover, the traffic manager can be used to implement a variety of desirable features across different computing environments. These computing environments are typically separated by one or more distinguishing characteristics. As will be appreciated, the traffic manager provides an integral and cost effective solution which can bridge these distinguishing characteristics as well as define and enforce policies across disparate computing environments. This is achieved by centralizing the generation of interfaces which allow interaction between any of the nodes in a distributed computing system. This avoids the redundancy and inefficiency inherent in building these capabilities in each node, particularly in complex systems. | 2009-04-23 |
20090106842 | System for Regulating Host Security Configuration - Methods and apparatus for dynamically revising host-intrusion-protection configurations according to varying host state and changing intrusion patterns are disclosed. A set of local servers, each functioning as a deep-security manager supporting a respective subset of the hosts, maintains and updates protection software containing filters and rules for deploying each filter. A local server cyclically monitors each host of its subset of hosts at time instants separated by adjustable monitoring periods to acquire host-characterizing data and determine an optimal set of filters. The local server maintains a profile for each host and determines a current monitoring period for a host according to the host's current profile. The processing effort is reduced by judicial adjustment of successive monitoring periods and selectively tailoring the host-characterizing data to the conditions of each host. | 2009-04-23 |
20090106843 | SECURITY RISK EVALUATION METHOD FOR EFFECTIVE THREAT MANAGEMENT - Provided is a security risk evaluation method for threat management. According to the present invention, new threats or vulnerabilities for a network which should be protected (target network) are collected, and a threat management environment is assessed by checking whether or not to apply attack-attempt detection rules and vulnerability assessment rules for assets related to the threats or vulnerabilities. Based on the assessment result, the range and level of response are previously checked and complemented, and corresponding risk evaluation is provided. Therefore, the threat management environment can be managed effectively. | 2009-04-23 |
20090106844 | SYSTEM AND METHOD FOR VULNERABILITY ASSESSMENT OF NETWORK BASED ON BUSINESS MODEL - Provided are a system and a method for vulnerability assessment of a network based on a business model. In the system and method, services of each node existing in a monitoring target network are monitored, and a business model is generated on the basis of the monitored services so as to perform vulnerability assessment on the business model. Accordingly, it is possible to guarantee the safety and availability of the system and the network while the vulnerability assessment is performed. | 2009-04-23 |
20090106845 | SYSTEMS AND METHODS FOR SECURING DATA IN AN ELECTRONIC APPARATUS - A method for securing data for an electronic apparatus includes flagging data stored in the electronic apparatus, setting a plurality of security functions corresponding to the flagged data, defining a plurality of hotkeys corresponding to the security functions, and defining a hold-down time for each of the hotkeys. In operation, a user may have to input one or more hotkeys in order to access various functions of the electronic apparatus. | 2009-04-23 |
20090106846 | SYSTEM AND METHOD FOR DETECTION AND MITIGATION OF IDENTITY THEFT - An identity theft and identity repair system and method is disclosed that uses public access databases to identify changes in the records of a person to detect and mitigate attempts of identity theft against the person. Unidentified data or changes in the person's name, address, social security number or phone number are used to determine possible attempts of identity theft against the person. Once a correct baseline of a person's publicly available personal information has been established, this information baseline is used to automatically monitor the person's public records on a periodic basis, notify the person of any detected changes which may be caused by the person or an imposter in an attempted identity theft. If identity theft is suspected, the system and method initiates a detailed analysis of the person's publicly available personal information to determine the extent of the (any) identity theft. A further option of the present system and method is to initiate needed corrective repairs. | 2009-04-23 |
20090106847 | System and Method for Media Rights Transfer - Systems and methods for facilitating the playback, viewing, exchange and transfer of media are disclosed. Media, either hard physical media or soft media, are provided to a depository/rights manager that associates the rights to the content of the media with the entity that provided it. Media provided to the depository/rights manager may be digitized, and the rights of the entity to that content may be verified. Once the media is stored by the depository/rights manager, entities, such as individual users, may use it, exchange it, or transfer it using, for example, computers connected to a communication network. In some embodiments, the depository/rights manager may provide an interface, such as an application programming interface (API) that allows the depository/rights manager to handle back-end legal compliance and rights tracking for third-party services and systems. | 2009-04-23 |
20090106848 | System and method for Time Sensitive Scheduling Data privacy protection - Providing privacy protection to an entity related to the passive delivery of time sensitive scheduling data via a Time Sensitive Scheduling Data Delivery Network is described. A communications network based passive delivery of privacy protected time sensitive scheduling data is accommodated to an entity. Specific privacy protected time sensitive scheduling data from sources including originating organizations, affiliated groups of individuals, and individuals are aggregated into time sensitive scheduling data streams. Then the specific privacy protected time sensitive scheduling data streams aggregated from sources including multiple originating organizations, affiliated groups of individuals, and individuals are transmitted via the communications network to the entity. Finally the time sensitive scheduling data is presented in a manner affording privacy based on content privacy states which determine the representation of a time sensitive scheduling data item being presented. | 2009-04-23 |
20090106849 | Portable Computer - A portable computer, comprising a first display screen in the portrait format housed in a first panel and a second display screen in the landscape format housed in a second panel. The second panel is physically attached to the first panel, and the diagonal size of the second display screen is 40% to 70% of the diagonal size of the first display screen. The effective size of the display area is larger than the physical area of the display screens, and the portable computer can have small size, light weight, and long battery life. | 2009-04-23 |
20090106850 | CONDITIONAL ACCESS TO DIGITAL RIGHTS MANAGEMENT CONVERSION - The present invention provides for an interface between two seemingly incompatible and different content protection systems. Accordingly, protected content may be transferred between the respective security kernels of a conditional access (CA) and digital rights management (DRM) systems, while maintaining security of the content and any associated protection information. The transfer and consumption of protected content and the associated content protection information may be achieved by temporarily or permanently binding the respective security kernels of the CA and DRM systems, transcribing content protection information, and potentially transcribing the content. | 2009-04-23 |
20090106851 | Non-Invasive, In Vivo Fluorescent Imaging of the Nervous System In Whole Living Animal - A method is disclosed involving detecting the expression of a fluorescent protein of interest in an animal, wherein the animal is a transgenic animal having in its genome nucleic acid encoding said fluorescent protein operably linked to promoter nucleic acid from a protein that is normally expressed in the nervous system of the animal, the method comprising the step of non-invasively detecting fluorescence from said protein when expressed in said animal. | 2009-04-23 |
20090106852 | Influenza Therapeutic - The present invention provides methods and compositions for inhibiting influenza infection and/or replication based on the phenomenon of RNA interference (RNAi) well as systems for identifying effective siRNAs and shRNAs for inhibiting influenza virus and systems for studying influenza virus infective mechanisms. The invention also provides methods and compositions for inhibiting infection, pathogenicity and/or replication of other infectious agents, particularly those that infect cells that are directly accessible from outside the body, e.g., skin cells or mucosal cells. In addition, the invention provides compositions comprising an RNAi-inducing entity, e.g., an siRNA, shRNA, or RNAi-inducing vector targeted to an influenza virus transcript and any of a variety of delivery agents. The invention further includes methods of use of the compositions for treatment of influenza. | 2009-04-23 |
20090106853 | Methods and materials using signaling probes - The present invention relates to methods of isolating cells or generating cell lines using signaling probes that produce a signal upon hybridization to a target sequence. Other methods that utilize the signaling probe include methods of quantifying the level of RNA expression, methods for identifying genetic recombinational events in living cells and methods of generating a transgenic animal using the isolated cells. The invention also provides protease probes. Signaling probes and protease probes that form stem-loop structures, three-arm junction structures, and dumbbell structures are provided. | 2009-04-23 |
20090106854 | Polyubiquitin Rubi3 Promoter and 5' Regulatory Sequences - The present invention provides novel expression control elements and methods for expressing a heterologous nucleotide sequence of interest in plants. Isolated nucleic acids, expression cassettes and vectors comprising the expression control elements are provided. Also provided are transformed plants, plant tissues, plant cells, plant seed, and the like, comprising the isolated nucleic acids, expression cassettes and vectors of the invention. Further provided are methods of expressing a heterologous nucleotide sequence of interest in a plant, plant tissue, plant cell, and the like. | 2009-04-23 |
20090106855 | Expression cassette for transformation comprising a modified viral sequence driven by a suitable promoter - Disclosed herein are novel methods and materials directed to transforming a host cell and expressing exogenous RNA therein. Specifically disclosed are DNA-launching platforms used to introduce a replicating viral segment attached to an exogenous polynucleotide into a cell, whereby the exogenous polynucleotide is expressed in said cell and confers a detectable trait. | 2009-04-23 |
20090106856 | Selection System for Wheat - The present invention relates to improved methods for the incorporation of DNA into the genome of a wheat plant based on a D-alanine or D-serine selection. Preferably, the transformation is mediated by | 2009-04-23 |
20090106857 | Maize Stress-Responsive NAC Transcription Factors and Promoter and Methods of Use - Methods and compositions for modulating plant development are provided. Polynucleotide sequences encoding ZmSNAC polypeptides are provided, as are the amino acid sequences of the encoded polypeptides. The sequences can be used in a variety of methods including modulating root development, modulating floral development, modulating leaf and/or shoot development, modulating senescence, modulating seed size and/or weight, and modulating tolerance of plants to abiotic stress. Transformed plants, plant cells, tissues, and seed are also provided. A stress-inducible ZmSNAC1 promoter is also provided. | 2009-04-23 |
20090106858 | Isolation and Characterization of the Csb3-1 Mutant of Arabidopsis Thaliana and Use Thereof as a Regulator of Resistance in Plants to Diseases Caused by Biotrophic Pathogens - The invention relates to the technical field of plant biotechnology and, more specifically, to the identification and characterization of the csb3-1 mutant of | 2009-04-23 |
20090106859 | Root-Preferred Regulatory Elements - The present invention provides compositions and methods for regulating expression of heterologous nucleotide sequences in a plant. Compositions are novel nucleotide sequences for a root-preferred promoter and terminator isolated from the maize 6PGD coding region. A method for expressing a heterologous nucleotide sequence in a plant using the regulatory sequences disclosed herein is provided. The method comprises transforming a plant cell to comprise a heterologous nucleotide sequence operably linked to one or more of the regulatory sequences of the present invention and regenerating a stably transformed plant from the transformed plant cell. | 2009-04-23 |
20090106860 | Regulatory Elements Associated with CBF Transcription Factor of Rye - The present invention provides compositions and methods for regulating expression of heterologous nucleotide sequences in a plant. Compositions are novel nucleotide sequences for a stress-induced promoter endogenously associated with the rye CBF31 coding region. A method for expressing a heterologous nucleotide sequence in a plant or plant cell using the regulatory sequences disclosed herein is provided. The method comprises transforming a plant cell to comprise a heterologous nucleotide sequence operably linked to a regulatory sequence of the present invention and optionally regenerating a stably transformed plant from the transformed plant cell. | 2009-04-23 |
20090106861 | Plants Having Increased Yield and a Method for Making the Same - The present invention concerns a method for increasing plant yield by modulating expression in a plant of a nucleic acid encoding a polypeptide having two WRKY domains or a homologue of such polypeptide. One such method comprises introducing into a plant a two-WRKY domain nucleic acid or variant thereof. The invention also relates to transgenic plants having introduced therein a two-WRKY domain nucleic acid or variant thereof, which plants have increased yield relative to control plants. The present invention also concerns constructs useful in the methods of the invention. The invention additionally relates to specific nucleic acid sequences encoding for the aforementioned proteins having the aforementioned plant growth improving activity, nucleic acid constructs, vectors and plants containing said nucleic acid sequences. | 2009-04-23 |
20090106863 | Overexpression of Starch Synthase in Plants - The present invention relates to a process for increasing the phosphate content of starches of genetically modified plant cells in comparison with starches from corresponding wild-type plant cells by introducing a foreign nucleic acid molecule which codes for a soluble starch synthase II. The present invention furthermore relates to the overexpression of this soluble starch synthase II in the genetically modified plant cells. Furthermore, the present invention relates to rice starch and rice flour with improved quality characteristics, to rice grains comprising this rice starch, and to rice plants on which these rice grains grow. | 2009-04-23 |
20090106864 | NOVEL DNA SEQUENCES, VECTORS AND PROTEINS OF AVIAN INFLUENZA HEMAGGLUTININ - The subject invention provides novel amino acid sequences (including a consensus sequence) of the Avian Influenza A virus hemagglutinin protein. These newly constructed genes are designed to provide a broader spectrum of activity across the serotype family thus providing a basis for a vaccine that has broad heterologous disease protection. The novel genes have been further improved by the addition of strategic glycosylation sites into the amino acids sequences that they encode. These genes can also, optionally, be codon optimized for plant expression, inserted into the appropriate vector and cloned into plants for expression. Polypeptides produced by recombinant host cells or transgenic plants can also be used as source of antigen for the formulation of vaccines for the control of influenza in susceptible individuals. Additionally, transgenic plant material may also be used as source of antigen for the formulation of vaccines for the control of influenza in susceptible individuals. | 2009-04-23 |
20090106865 | Systemic non-nodular endosymbiotic nitrogen fixation in plants - Non-leguminous crops, e.g. wheat, maize and rice, do not form nodules and are dependant for their nutrition on fixed nitrogen from the soil, or from chemical/nitrogenous fertilizers. The present invention provides non-leguminous plants and leguminous plants, including legumes that fail to nodulate with | 2009-04-23 |
20090106866 | Promoter, Promoter Control Elements, And Combinations, And Uses Thereof - The present invention is directed to promoter sequences and promoter control elements, polynucleotide constructs comprising the promoters and control elements, and methods of identifying the promoters, control elements, or fragments thereof. The invention further relates to the use of the present promoters or promoter control elements to modulate transcript levels. | 2009-04-23 |
20090106867 | RED LETTUCE - The present invention relates to a head-forming lettuce plant of the species | 2009-04-23 |
20090106868 | ATOMIC FORCE MICROSCOPE TIP SHAPE DETERMINATION TOOL - The invention relates to an atomic force microscope tip characterization tool. An atomic force microscope uses a very fine exploration tip placed at the end of an elastic cantilever beam and an optical system for exploring movements of the beam in contact with a relief to be explored. The shape of the exploration tip must be known, and to this end a tool is used, placed in an atomic force microscope, the known shapes whereof are used to derive the shape of the tip. The tool of the invention includes a thin silicon beam ( | 2009-04-23 |
20090106869 | METHOD FOR FABRICATING SPM AND CD-SPM NANONEEDLE PROBE USING ION BEAM AND SPM AND CD-SPM NANONEEDLE PROBE THEREBY - The present invention relates to a method for fabricating a scanning probe microscope (SPM) nanoneedle probe using ion beam which is preferably focused ion beam and a nanoneedle probe thereby. More particularly, the present invention relates to a method for fabricating a SPM nanoneedle probe capable of being easily adjusted with an intended pointing direction of a nanoneedle attached on a tip of the SPM nanoneedle probe and of being easily straightened with the nanoneedle attached on the tip of the SPM nanoneedle probe along the intended pointing direction, and to a SPM nanoneedle probe thereby. Also, the present invention relates to a method for fabricating a critical dimension SPM (CD-SPM) nanoneedle probe capable of precisely scanning the sidewall of an sample object in nanoscale using ion beam which is preferably focused ion beam, and to a CD-SPM nanoneedle probe thereby. More particularly, the present invention relates to a method for fabricating a CD-SPM nanoneedle probe capable of precisely scanning the sidewall of the sample object in nanoscale by bending a portion of an end of the nanoneedle attached on the tip of the SPM nanoneedle probe in a specific angle toward a direction other than an original direction in which the nanoneedle attached on the tip of the SPM nanoneedle probe extends out, and to a CD-SPM nanoneedle probe thereby. A method of fabricating scanning probe microscope (SPM) nanoneedle probe using ion beam, comprises: positioning the probe so that a tip of the probe on which the nanoneedle is attached faces toward a direction in which the ion beam is irradiated; and aligning the nanoneedle attached on the tip of the probe with the ion beam in parallel by irradiating the ion beam toward the tip of the probe on which the nanoneedle is attached. A method of fabricating a critical dimension scanning probe microscope (CD-SPM) nanoneedle probe using ion beam, comprises: screening a certain portion of the nanoneedle attached on a tip of the probe using a mask; and bending a part of the nanoneedle exposed out of the mask to align the part of the nanoneedle by irradiating the ion beam on the part of the nanoneedle exposed out of the mask, along the direction of the irradiated ion beam. | 2009-04-23 |
20090106870 | Hybrid tea rose plant named 'MEIZOELE' - A new and distinct variety of Hybrid Tea rose plant is provided which abundantly forms attractive double bicolored blossoms that are yellow bordered with red in coloration. The plant exhibits a vigorous growth habit, semi-glossy dark green foliage, and very good disease resistance. The dark green foliage contrasts nicely with the lighter colored blossoms. The new variety is particularly well suited for growing as attractive ornamentation in the landscape such as in parks and gardens. | 2009-04-23 |