19th week of 2010 patent applcation highlights part 67 |
Patent application number | Title | Published |
20100122291 | APPARATUS AND METHOD FOR PROCESSING IMAGE - Disclosed is an image processing apparatus including: an image processing unit which processes and displays a broadcasting signal; a user input unit through which a user inputs a key selection signal; and a controller which performs a switch to a favorite channel or performs a certain function in association with the favorite channel if an input time of the key selection signal is equal to or longer than a predetermined time. With this, a viewer can more directly and conveniently search favorite channels. | 2010-05-13 |
20100122292 | PROGRAM GUIDE APPLICATION INTERFACE SYSTEM - A program guide system is provided that supports a program guide application and multiple non-guide applications. The program guide system has a program guide application interface that allows the non-guide applications to use both device resources and program guide resources. The application interface maintains a list of registered applications and directs control requests from various applications to the current primary application. The application interface also has a user interface input director that directs keystrokes and other user input commands to the appropriate application. If a keystroke for the program guide application is detected while a non-guide application is running, the program guide application is invoked. | 2010-05-13 |
20100122293 | SYSTEMS AND METHODS FOR DETECTING INCONSISTENT USER ACTIONS AND PROVIDING FEEDBACK - Systems and methods are provided for detecting inconsistent user actions and providing feedback about assets. A user may perform a first action restricting access to a first asset. The system may detect whether a second action performed relative to a second asset that has a similar attribute as the first asset is inconsistent with the first asset. The inconsistency may be detected when the second action removes or is an inaction that does not place access restrictions on the second asset. The system may alert the user about the inconsistency and the user may act on the alert by providing feedback about the inconsistency and/or the first/second asset, ignoring the inconsistency and/or placing an access restriction or other action consistent with the first action relative to the second asset. The user may also provide detailed feedback about an inconsistency or asset through a website accessed on another device. | 2010-05-13 |
20100122294 | SYSTEMS AND METHODS FOR CREATING CUSTOM VIDEO MOSAIC PAGES WITH LOCAL CONTENT - Systems and methods for providing custom video mosaic pages are provided. The custom pages may be locally-generated, remotely-generated, or partially locally-generated and partially remotely-generated. The custom pages may include local content, such as content recorded to a digital video recorder (DVR), overlaid on a multi-video composite feed. A local compositing system may render the mosaic pages and dynamically customize the pages based on user profile data, user preferences, and active user monitoring. | 2010-05-13 |
20100122295 | METHOD FOR DEFINING TELEVISION CONTENT LINEUP - The present disclosure is directed to a method for defining a content lineup for a television. The method may comprise receiving a list of scheduled contents from at least one television channel; adding a plurality of user-selected contents to the content lineup having a start time and an end time, further comprising: receiving a selection for a first content from the list of scheduled contents for playing at the start time; determining a second start time based on the start time and a duration of the first content; receiving a selection for a second content from the list of scheduled contents for playing at the second start time; and playing the plurality of user-selected contents according to the content lineup during a period from the start time to the end time. | 2010-05-13 |
20100122296 | TELEVISION TUNING ON START-UP - A method includes requesting most-watched program information from a subscription television service and identifying the most-watched program for a current time slot. The method further includes receiving a channel identification for the most-watched program for the current time slot, automatically tuning to the most-watched program based on the channel identification, and displaying the most-watched program. The most-watched program may be tuned at the start of a set-top box initialization sequence to give perception of a fast start time. | 2010-05-13 |
20100122297 | SYSTEM AND METHOD FOR USER LIKES MODELING - Modeling user likes and dislikes is an important aspect of target marketing. Typically, a user performs several activities related to a particular domain, and the outcomes of these activities indicate the extent of liking/disliking that resulted on account of these activities. Further, many of these activities are performed on a routine basis. The problem of user likes modeling is to analyze these various activities performed by the user and the solution is to arrive at a likes/dislikes model of the user. Such a likes/dislikes model helps in, for example, ad targeting in the context of TV viewing and cross-selling in the case of mobile services. | 2010-05-13 |
20100122298 | Virtual channel table for a broadcast protocol and method of broadcasting and receiving broadcast signals using the same - A virtual channel table for broadcasting protocol and a method for broadcasting by using the virtual channel table includes identification information identifying and permitting discrimination of active and inactive channels contained in the virtual channel table. At a receiver, the virtual channel table transmitted from the transmitting side is parsed, thereby determining whether the current received channel is an active or inactive channel. | 2010-05-13 |
20100122299 | Virtual channel table for a broadcast protocol and method of broadcasting and receiving broadcast signals using the same - A virtual channel table for broadcasting protocol and a method for broadcasting by using the virtual channel table includes identification information identifying and permitting discrimination of active and inactive channels contained in the virtual channel table. At a receiver, the virtual channel table transmitted from the transmitting side is parsed, thereby determining whether the current received channel is an active or inactive channel. | 2010-05-13 |
20100122300 | INTERACTIVE CONTENT REPRODUCTION - In an interactive content reproduction apparatus, user information is stored in the content reproduction apparatus, which is not at a server but at a client, and the content reproduction apparatus selects unit contents of specific levels from among interactive content according to the user information and reproduces a user-adaptive story in which the selected level-specific unit contents are connected in real time or non-real time. | 2010-05-13 |
20100122301 | SATELLITE BROADCAST RECEIVING AND DISTRIBUTION SYSTEM - The present invention provides for a satellite system that will permit for the transmission of signals of two different frequencies and polarities to be transmitted simultaneously, also the system will accommodate two different polarity commands from two or more different sources at the same time. The satellite system of the present invention includes a satellite dish or antenna that receive signals. These received signals are then transmitted to a converter. A head-in frequency processor is coupled to the converter. This head-in frequency processor enables the different frequencies and polarities to be transmitted simultaneously via a single coaxial cable. This single coaxial cable is coupled to a head-out receiver processor which is connected to a receiver. This receiver is connected to a source. This unique design and configuration provides for the system that will permit for satellite broadcasting to occur in locations that are not in the line-of-sight path to the satellites. Accordingly, the satellite system of the present invention will permit satellite broadcasting in high-rises, hospitals, condominiums, schools, and the like. | 2010-05-13 |
20100122302 | Method of management of trick mode commands destined to control a digital content streaming server - The invention relates to a method of management of trick mode commands destined to control a digital content streaming server. In order to manage the transmission of trick mode commands from multiple trick mode command issuers, the method comprises:
| 2010-05-13 |
20100122303 | USER AUTHENTICATION IN A CONTENT DELIVERY NETWORK - Embodiments generally disclosed herein include computer-implemented methods for delivery of video content across a network. Such methods comprise a content delivery manager capable of receiving a video stream from a content source for delivery to a end user of a content publisher. The content delivery manager is further capable of detecting a trigger signal within the video stream. For example, the trigger signal can indicate a temporal mark injected into the video stream by the content publisher. During general operation, the content delivery manager processes the trigger signal to determine whether to modify delivery of the video stream to the end user. According to another general embodiment, a computer-implemented method is provided for authorizing delivery of a video stream to an end user. | 2010-05-13 |
20100122304 | Synchronized Media Experience - A synchronized media experience is described. A media server identifies a group of two or more remote media entertainment systems through which user-controlled play of media content may be presented. The server generates and transmits one or more synchronization commands to the remote media entertainment systems to synchronize presentation of a particular media content through the two or more remote media entertainment systems. A control command entered by a user of one of the remote media entertainment systems may be communicated to each of the two or more remote media entertainment systems to enable synchronized, user controlled presentation of the particular media content. | 2010-05-13 |
20100122305 | DYNAMIC PROCESSING OF STREAMED CONTENT - Embodiments generally disclosed herein include computer-implemented methods for delivery of video content across a network. Such methods comprise a content delivery manager capable of receiving a video stream from a content source for delivery to a end user of a content publisher. The content delivery manager is further capable of detecting a trigger signal within the video stream. For example, the trigger signal can indicate a temporal mark injected into the video stream by the content publisher. During general operation, the content delivery manager processes the trigger signal to determine whether to modify delivery of the video stream to the end user. According to another general embodiment, a computer-implemented method is provided for authorizing delivery of a video stream to an end user. | 2010-05-13 |
20100122306 | System and Method for Tagging Video Content - A method of tagging video content includes receiving video content at a set-top box device via a private video distribution access network. The method also includes receiving a tag associated with the video content at the set-top box device and sending the tag to a tag management system via the private video distribution access network. Further, the method includes sending a request for content associated with the tag to the tag management system and receiving the video content at the set-top box device. | 2010-05-13 |
20100122307 | METHOD FOR PROCESSING DIGITAL BROADCASTING DATA APPLICATION - A method for processing a digital broadcasting data application is disclosed. In accordance with the method of the present invention, a data of a minimum quantity required for executing a data application is received the digital broadcast network and other data is received by a pull method to minimize a time required for receiving and executing the data application. | 2010-05-13 |
20100122308 | INFORMATION PROCESSING DEVICE, NODE DEVICE, METHOD FOR PROCESSING REPRODUCTION INFORMATION, AND REPRODUCTION INFORMATION PROCESSING PROGRAM - An information processing device includes: a communication unit, an obtaining unit, a deter urination unit, and a generation unit. The communication unit communicates with node devices. The obtaining unit obtains specific information that specifies a reproduction interval on a reproduction time axis during which content data are reproduced by the node device. The determination unit determines a reproduction score related to a number of reproductions of the content data at each of a plurality of time positions on the reproduction time axis, based on the specific information obtained by the obtaining unit. The generation unit generates an output signal for outputting reproduction score information indicating the reproduction scores of the plurality of time positions, based on the reproduction score determined by the determination unit. | 2010-05-13 |
20100122309 | COMMENT DELIVERY SERVER, TERMINAL DEVICE, COMMENT DELIVERY METHOD, COMMENT OUTPUT METHOD, AND RECORDING MEDIUM STORING COMMENT DELIVERY PROGRAM - There is provided a comment delivery server in a comment delivery system having: a video delivery server which delivers video data a comment delivery server which delivers comments relating to the video; and a terminal device, wherein the comment delivery server has: a conversion data storage section which stores conversion data which associates a comment targeted for conversion together with the comment obtained after the targeted comment has been converted; a receiving section which receives as comment information from the terminal device a comment and a comment attachment time which represents an elapsed video playback time at the point when the comment was attached; a determination section which refers to the conversion data storage section and determines whether or not a comment targeted for conversion is included in the comment information received by the receiving section; a comment conversion section which, when it is determined based on a determination result from the determination section that a comment targeted for conversion is included in the comment information received by the receiving section, refers to the conversion data storage section and converts the received comment into a post-conversion comment which corresponds to this comment; a comment information storage section which stores the comment information after it has been converted by the conversion section; and a comment delivery section which delivers the comment stored in the comment information storage section to the terminal device. | 2010-05-13 |
20100122310 | DIGITAL BROADCAST RECEIVER - The digital broadcast receiver, including a decoding continuation determining unit in the system control unit, does not stop decoding and outputting video and audio when determining hierarchical switching and continues decoding and outputting video and audio until the digital broadcast receiver receives given video/audio data after switching, or until the video and audio buffer accumulating video/audio data before switching becomes empty. | 2010-05-13 |
20100122311 | PROCESSING LATTICED AND NON-LATTICED PICTURES OF A VIDEO PROGRAM - In one embodiment, a method that includes receiving plural representations of a video signal, the video signal comprising plural sequenced pictures corresponding to at least a portion of a video program, wherein two or more of the plural representations of the video signal (PROTVS) includes a respective sequence of latticed pictures and one or more of the other PROTVS includes a respective sequence of non-latticed pictures; and providing in plural successive non-overlapping segments distribution interval (SDIs) compressed versions of the PROTVS in a single video stream, wherein each SDI consists of plural non-overlapping, consecutive segments, each of the plural non-overlapping consecutive segments originating from a respective one of the collective PROTVS. | 2010-05-13 |
20100122312 | PREDICTIVE SERVICE SYSTEMS - A predictive service system can include a gathering service to gather user information, a semantic service to generate a semantic abstract for the user information, a policy service to enforce a policy, and a predictive service to act on an actionable item that is created based on the user information, the semantic abstract, and the policy. The system can also include an analysis module to create the actionable item and send it to the predictive service. The system can also include an identity service to create a crafted identity for the user. | 2010-05-13 |
20100122313 | METHOD AND SYSTEM FOR RESTRICTING FILE ACCESS IN A COMPUTER SYSTEM - A computer-implemented method is provided of controlling file access in a computer system. The method includes: (a) reading file association information; (b) building a security policy in accordance with the file association information comprising rules that restrict the access of applications to files based on file type, format, or extension; and (c) providing additional rules for the security policy not based on the file association information; (d) storing the security policy; and (e) controlling file access in accordance with the security policy. | 2010-05-13 |
20100122314 | ACTIVE ACCESS MONITORING FOR SAFER COMPUTING ENVIRONMENTS AND SYSTEMS - Techniques for controlling access are disclosed. The techniques can be used for reference monitoring in various computing systems (e.g., computing device) including those that may be relatively more susceptible to threats (e.g., mobile phones). Allowed access can be disallowed. In other words, permission to access a component can be effectively withdrawn even though access may be on-going. After permission to access a component has been allowed, one or more disallow access conditions or events can be effectively monitored in order to determine whether to withdraw the permission to access the component. As a result, allowed access to the component can be disallowed. Access can be disallowed by effectively considering the behavior of a component in the aggregate and/or over a determined amount of time. By way of example, a messaging application can be disallowed access to a communication port if the messaging application sends more messages than an acceptable limit during a session or in 4 hours. Disallow-access policies, rules and/or conditions can be defined and modified, for example, by end-users and system administrators, allowing a customizable and flexible security environment that is more adaptable to change. | 2010-05-13 |
20100122315 | METHODS AND APPARATUS RELATED TO TRANSMISSION OF CONFIDENTIAL INFORMATION TO A RELYING ENTITY - In one embodiment, a method includes defining a request for confidential information from a domain of confidential information based on an input from a relying entity. The domain of confidential information can be associated with a subject entity. A response to the request can be defined at an information provider. The method can also include sending the response to the relying entity when the response has been approved by the subject entity. | 2010-05-13 |
20100122316 | User Controlled Identity Authentication - A system, method for user controlled identity authentication comprising: a) At least one central computer having at least one user within a user database having user data and at least one service provider within a service provider database with service provider data; b) At least one service provider having electronic communication with the central computer; c) At least one user having electronic devices capable of communications with the central computer and service provider; e) Providing a user with a set of controls within the central computer to customize privacy, security and authentication of the user data; f) Providing a set of access rights within the service provider data of the central computer having a set of transaction rules for the service provider. | 2010-05-13 |
20100122317 | Integrated Network Intrusion Detection - Intrusion preludes may be detected (including detection using fabricated responses to blocked network requests), and particular sources of network communications may be singled out for greater scrutiny, by performing intrusion analysis on packets blocked by a firewall. An integrated intrusion detection system uses an end-node firewall that is dynamically controlled using invoked-application information and a network policy. The system may use various alert levels to trigger heightened monitoring states, alerts sent to a security operation center, and/or logging of network activity for later forensic analysis. The system may monitor network traffic to block traffic that violates the network policy, monitor blocked traffic to detect an intrusion prelude, and monitor traffic from a potential intruder when an intrusion prelude is detected. The system also may track behavior of applications using the network policy to identify abnormal application behavior, and monitor traffic from an abnormally behaving application to identify an intrusion. | 2010-05-13 |
20100122318 | POLICY-BASED SERVICE MANAGMENT SYSTEM - A policy-based management mechanism is provided, whereby the mechanism provides for at least the controlling of access to network resources, the integration of different frameworks into a common open standard, and modular components for assembling integrated date and voice services. The mechanism accomplishes this by using an access management component that checks for access credentials, a service management component that identifies which resources are available to a requestor of resources, and a resource management component that manages the requested resources. In one exemplary implementation, a fourth component, the policy management component links the first three components such that a resource request gains access to resources based on policy decisions determined by the fourth component for the first three components. | 2010-05-13 |
20100122319 | INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING APPARATUS AND INFORMATION PROCESSING METHOD - A system includes a web server and an apparatus with a web browser configured to display an operation screen provided by the web server. The apparatus authenticates a user and transmits authentication information to the web server when the user is authenticated and requests the operation screen which is to be displayed on the web browser. The web server determines whether the authentication information has been received from the apparatus when the operation screen is requested and transmits the operation screen to the apparatus when it is determined that the authentication information has been received from the information processing apparatus as a result of the determination. | 2010-05-13 |
20100122320 | Secure and Self Monitoring Slot Gaming Network - Among other things, systems and techniques are described for authenticating one or more client devices. A system includes one or more client devices and a server to communicate with the one or more client devices over a network. The server receives a request for network connection from at least one of the client devices. In response to the received request, the server performs authentication of the requesting client device based on at least two factors. The at least two factors includes a transmission control protocol (TCP) header verification to identify a media access control (MAC) address of the requesting client device as an authorized or unauthorized MAC address; and a challenge-reply verification performed based on the TCP header verification. The challenge-reply verification includes sending a challenge message sent to the requesting client device; receiving a reply message from the requesting client device; and identifying the received reply message as a correct or incorrect reply. | 2010-05-13 |
20100122321 | SYSTEM AND METHOD FOR AUTHENTICATION FOR WIRELESS EMERGENCY SERVICES - A method of authenticating a user device includes transmitting a request, the request including a query for information, and receiving an identifier, the identifier being associated with one or more authentication mechanisms for obtaining access to emergency services. | 2010-05-13 |
20100122322 | METHOD FOR ADMISSION CONTROL OF MULTIPLE SERVICE FLOWS PAGING IN MOBILE PACKET DOMAIN - A method for paging admission control for multi-service flows in a mobile packet domain is provided and comprises steps of when authentication of a mobile station accessing a connectivity service network through an access service network succeeds, assigning a service flow paging strategy for a downlink service flow of the mobile station, and sending the service flow paging strategy to the access service network; receiving, by the access service network, downlink data of a mobile station in IDLE state from a home agent, searching for a downlink service flow to which the downlink data belong, and judging whether the service flow admits paging according to the service flow paging strategy, and if yes, initiating a paging flow triggered by the downlink data. | 2010-05-13 |
20100122323 | STORAGE DEVICE MANAGEMENT SYSTEMS AND METHODS - Storage device management systems and methods are provided. The system includes a storage device and an electronic device. The storage device has a UID, a public area comprising a URL (Uniform Resource Locator) and a security module, and a hidden area comprising at least one key. The electronic device reads the security module from the storage device, and executes the security module to encrypt the UID. The electronic device links to a host according to the URL, and transmits the encrypted UID of the storage device to the host for management. | 2010-05-13 |
20100122324 | OVER THE AIR SERVICES FOR MOBILE DEVICES - A client device may be managed in the event of, for example, device loss or mislocation. In such a case, a user can effectively cause a restriction command to be generated, where the restriction command is wirelessly transmitted to the client device. The restriction command can be specified to either lock user data on the client device or erase user data on the client device. | 2010-05-13 |
20100122325 | Data Session Authentication Credentials Update For A Wireless Communication Device - Methods and apparatus of a wireless portable communication device for maintaining appropriate authentication credentials for accessing a data application maintained in a service network are provided. A default access point name (APN) or network access identifier (NAI) is maintained in memory of the wireless device. The wireless device submits, via a default wireless network, the default APN or NAI for establishing a data session in the default wireless network. The wireless device is then able to receive, in the data session via the default wireless network, a message service using the common data application maintained in the service network. In response to a change in service subscription for the wireless device, the wireless device receives, via a current cellular network, a current APN or NAI and stores it in its memory. The wireless device then submits, via the current wireless network, the current APN or NAI for establishing a data session in the current wireless network. The wireless device is then able to receive, in the data session via the current wireless network, the message service using the common data application maintained in the service network. | 2010-05-13 |
20100122326 | Systems and Methods for State-Less Authentication - Systems and methods for providing user logon and state-less authentication are described in a distributed processing environment. Upon an attempted access by a user to an online resource, transaction, or record, a logon component asks the user to supply a logon ID and a password. The logon component verifies the provided information, and upon successful identification, a security context is constructed from information relevant to the user. The security context is sent to the user and is presented to the system each time the user attempts to invoke a new resource, such as a program object, transaction, record, or certified printer avoiding the need for repeated logon processing. | 2010-05-13 |
20100122327 | SECURE AUTHENTICATION FOR ACCESSING REMOTE RESOURCES - Methods, systems, and apparatus, including computer program products, for secure authentication for accessing remote resources are disclosed. In some implementations, a user is authenticated for a first time on an interface using a first communications channel; the user is authenticated a second time on the interface using a second communications channel; access privileges are determined based on authenticating the user for the second time; and a random Uniform Resource Locator (URL) is generated based on the access privileges, where the random URL is single-use and indirectly associated with a requested resource. | 2010-05-13 |
20100122328 | METHOD, HARDWARE PRODUCT, AND COMPUTER PROGRAM PRODUCT FOR OPTIMIZING SECURITY IN THE CONTEXT OF CREDENTIAL TRANSFORMATION SERVICES - Security is optimized in the context of a credential transformation service (CTS) by utilizing a web services client runtime to gather information for determining whether or not a target web service is hosted in a security domain used by a client application and for determining whether or not the target web service uses an authentication mechanism substantially identical to that used by the client application. The gathered information is carried in an endpoint reference (EPR) of the target web service. In response to the client receiving the EPR, the client applies an optimization process to eliminate a possible unnecessary invocation of the CTS, wherein the target web service is an authoritative manageable resource having minimal or no responsibility for providing its identity, and having minimal or no responsibility for advertising any creation and destruction lifecycle related events. | 2010-05-13 |
20100122329 | AUTHENTICATION BASED ON USER BEHAVIOR - One embodiment of the present invention provides a system for authenticating a user. During operation, the system records user behavior history at one or more devices associated with the user. The system then extracts user information associated with a place and/or an activity from the recorded user behavior history. The system further generates one or more challenges based on the extracted user information, thereby facilitating the verification of the user's identity. | 2010-05-13 |
20100122330 | AUTOMATIC LOCAL LISTING OWNER AUTHENTICATION SYSTEM - A method and apparatus for verifying that a user is the owner of a public listing is provided. The user selects an option to claim ownership of the public listing offered by an online service provider. The online service provider uses information regarding the user and the public listing to generate a verification code. The online service provider delivers the verification code to the owner of the public listing via the contact information provided by the public listing. If the user owns the public listing, the user receives the verification code via contact information associated with the public listing. The user verifies ownership by inputting a code to the online service provider. If the inputted code matches the verification code, then the online service provider identifies the user as the owner of the listing. Once verified, the user modifies the listing. | 2010-05-13 |
20100122331 | SINGLE USE WEB BASED PASSWORDS - Embodiments are directed towards employing a plurality of single use passwords to provide phishing detection and user authentication. A user receives a plurality of single use passwords that expire within a defined time period after having been sent to a registered device. During a login attempt, the user enters a user name and a requested one of the passwords, which once entered expires. If valid, the user then enters a portion of another password to complete a displayed portion of a password, and a specified other one of passwords. If the displayed portion of the other passwords does not match any portion of one of passwords, then the user may detect a phishing attempt and terminate the login. If the user correctly the password data, the user may then access secured data. Each new login request requires a different set of passwords to be used. | 2010-05-13 |
20100122332 | FILE SERVER FOR TRANSLATING USER IDENTIFIER - A file server including: a first interface coupled to a client computer which manages a client side user identifier used by the client computer to identify a client computer user; a second interface coupled to a first storage storing first file system data and a first file system side user identifier used by the first file system to identify the client computer user, and a second storage storing second file system data and a second file system side user identifier used by the second file system to identify the client computer user; a processor which receives a client computer's first access request to the first file system, obtains a first file system identifier which identifies the first file system and the first file system side user identifier, and translates the first file system side user identifier to a first client side user identifier using the first file system identifier. | 2010-05-13 |
20100122333 | METHOD AND SYSTEM FOR PROVIDING A FEDERATED AUTHENTICATION SERVICE WITH GRADUAL EXPIRATION OF CREDENTIALS - The present invention relates to the field of authentication of users of services over a computer network, more specifically within the paradigms of federated authentication or single sign-on. A known technique consists of associating different trust levels to different authentication mechanisms, wherein the respective trust levels give access to different information resources, notably to provide the possibility to protect more sensitive resources with a stronger form of authentication. The present invention provides a mechanism to allow the trust level to decrease without re-authenticating with the single sign on system, down to the level at which it is no longer sufficient to obtain access to a desired resource. Only then, the user needs to reauthenticate. | 2010-05-13 |
20100122334 | Internet based data, voice and video alert notification communications system - A real-time integrated information sharing and telecommunications collaboration system is disclosed. The system includes at least one central server to create, store, display, edit, distribute, share, control and archive voice, data, video and images with a plurality of simultaneous wireless and wireline remote display devices. The system includes at least one central server monitors, controls and protects voice, data, video and image communications to, from and between display devices through encrypted token based security identifiers. The sharing of information and communication data packets between the display devices is contingent upon permissions assigned to individual human or machine end users. All data and communications, including the encrypted token based security identifiers may be stored simultaneously or individually within the central server, display device, or a third-party remote storage device whereby each or all may reside behind additional security systems and firewalls at a plurality of locations. All voice, data, video and images are seamlessly integrated through either one or in combination of communications paths to include, but not limited to, the Public Switched Telephone Network, World Wide Web, Internet, Wireless Wide Area Network (WWAN), Wide Area Network (WAN), Local Area Network (LAN), satellite, land mobile radio, WiFi, Worldwide Interoperability for Microwave Access (WiMAX), broadband over powerlines and other wireline and wireless networks. | 2010-05-13 |
20100122335 | System and Method for Filtering Unwanted Internet Protocol Traffic Based on Blacklists - A system and method for filtering unwanted Internet Protocol traffic based on blacklists receives a first blacklist containing a first plurality of Internet protocol addresses associated with unwanted Internet traffic. The system also operates a first plurality of access control lists adapted to block the unwanted Internet traffic from one of the first Internet protocol addresses listed in the first blacklist. The system also assigns a first weight to each of the first Internet protocol addresses based on a reliability of Internet traffic from each of the first Internet protocol addresses. Additionally, the system reduces a first number of the first access control lists to optimally trade off a number of desirable Internet protocol addresses blocked with a number of bad Internet protocol addresses blocked based on the first weight of each of the first Internet protocol addresses. | 2010-05-13 |
20100122336 | METHOD AND APPARATUS FOR TWO-WAY TRANSMISSION OF MEDICAL DATA - The present invention provides for a secure, two-way transmission of medical data over the Internet and through the hospital's firewall using push and pull mechanisms. More particularly, the present invention utilizes standard SSH technology and the rsync and scp protocols to enable secure, cost-effective data transmission over the Internet. The hospital firewall is traversed through the use of an agent located behind the hospital's firewall. The agent utilizes a push mechanism to push the raw scan data through the firewall and over the Internet to the outside third party; and the agent uses a pull mechanism to reach through the firewall and over the Internet to retrieve the data processed by the outside third party. In other words, the present invention transfers data from the hospital to the third party by initiating a data push mechanism from behind the hospital firewall; and transfers the processed data from the outside third party back into the hospital by initiating a data pull mechanism from behind the hospital firewall. The aforementioned agent acts as a broker for the foregoing data transmission and also encodes how the data should be handled once it is received on the hospital side. | 2010-05-13 |
20100122337 | System and method for integrating mobile networking with security-based VPNS - Systems and methods provide a secure network path through an inner and outer firewall pair between a mobile node on a foreign network and a corresponding node on a home network. One aspect of the systems and methods includes providing a mobile IP proxy between the mobile node and a VPN gateway inside the firewalls. The mobile IP proxy acts as a surrogate home agent to the mobile node, and acts as a surrogate mobile node to a home agent residing on the home network. | 2010-05-13 |
20100122338 | NETWORK SYSTEM, DHCP SERVER DEVICE, AND DHCP CLIENT DEVICE - When customer-premises communication equipment connected to a home gateway device is about to establish IP communication with a server on a network, the present invention enables the server to establish communication after verifying that the physical connection location of the communication equipment is authorized. When a DHCP server issues an IP address to the home gateway device, the DHCP server not only passes a circuit-ID-based identifier to the home gateway device, but also transmits the identifier and information about the home gateway device to the server. Upon receipt of the identifier through the home gateway device, a communication equipment requests to establish IP communication with the server by using the identifier and the information about the home gateway device to which the communication equipment is connected. This permits the server to check whether the connection path of the communication equipment that has requested to be connected is proper. | 2010-05-13 |
20100122339 | DATA SURVEY DEVICE, INTEGRATED WITH AN ANTITAMPER SYSTEM | 2010-05-13 |
20100122340 | ENTERPRISE PASSWORD RESET - One embodiment of the present invention provides a system for automatically authenticating a user. During operation, the system receives a user's request for authentication. The system then extracts information associated with the user from user-specific information stored in an enterprise computer. The extracted user information does not explicitly relate to a password. The system further generates one or more challenges based on the extracted user information, and receives the user's response to the challenges. Subsequently, the system compares the user's response to the extracted user information, and authenticates the user. | 2010-05-13 |
20100122341 | AUTHENTICATING USERS WITH MEMORABLE PERSONAL QUESTIONS - One embodiment provides a system that verifies a user's identity. The system generates a list including a plurality of items and formulates a substantially large set of security questions base on the plurality of items. The number of questions in the set is significantly larger than a subset of security questions presented to the user to reduce the likelihood of the same questions being asked repeatedly. During account creation, the system presents to the user the subset of questions, and receives and stores a response from the user. At least one question in the subset is selected based on user information that is automatically extracted from devices associated with the user. Subsequently, the system receives a request to reset the user's password and presents the subset of questions to the requester. The system determines whether the requester is the user by comparing the requester's response with the stored user response. | 2010-05-13 |
20100122342 | IDENTIFYING ABORMAL NETWORK TRAFFIC - A method of identifying traffic within a network representative of an abnormal network condition, including: monitoring a communications link for a high traffic volume level; identifying a domain being the source of the high traffic volume level; identifying within the domain, a sending entity transmitting traffic from the domain; using a detector located at or proximate to the domain to invoke a response from the sending entity; wherein a failure by the sending entity to provide an expected response to the message in accordance with a network protocol indicates that the traffic transmitted by the sending entity is traffic representative of an abnormal network condition. | 2010-05-13 |
20100122343 | Distributed Sensor for Detecting Malicious Software - Processor(s) for detecting malicious software. A hardware virtual machine monitor (HVMM) operates under a host OS. Container(s) initialized with network application template(s)operate under a guest OS VM. A detection module operates under the guest OS VM includes a trigger detection module, a logging module and a container command module. The trigger detection module monitors activity on container(s) for a trigger event. The logging module writes activity report(s) in response to trigger event(s). The container command module issues command(s) in response to trigger event(s). The command(s) include a container start, stop and revert commands. A virtual machine control console operates under the host OS and starts/stops the HVMM. A container control module operates under the guest OSVM and controls container(s) in response to the command(s). The server communication module sends activity report(s) to a central collection network appliance that maintains a repository of activities for infected devices. | 2010-05-13 |
20100122344 | SYSTEMS AND METHODS FOR DETECTING AND PREVENTING FLOODING ATTACKS IN A NETWORK ENVIRONMENT - A method for processing network traffic data includes receiving a packet, and determining whether the packet is a previously dropped packet that is being retransmitted. A method for processing network traffic content includes receiving a plurality of headers, the plurality of headers having respective first field values, and determining whether the first field values of the respective headers form a first prescribed pattern. A method for processing network traffic content includes receiving a plurality of packets, and determining an existence of a flooding attack without tracking each of the plurality of packets with a SYN bit. | 2010-05-13 |
20100122345 | CONTROL SYSTEM AND PROTECTION METHOD FOR INTEGRATED INFORMATION SECURITY SERVICES - A control system and protection method for integrated information security services are provided, which include protecting data packets of a user end device by a protecting device; generating an event log according to the protection result and transmitting the recorded event log to a collective control platform for standardizing and analyzing association by the collective control platform; detecting and transmitting abnormal information by the collective control platform to a service platform for integrating the information with network status information; displaying the integrated information on a webpage interface and transmitting the same to the user end device, thereby providing direct information on network security to save the high costs of purchasing, configuring and maintaining an information security protection system by the user. | 2010-05-13 |
20100122346 | METHOD AND APPARATUS FOR LIMITING DENIAL OF SERVICE ATTACK BY LIMITING TRAFFIC FOR HOSTS - A method for controlling a denial of service attack involves receiving a plurality of packets from a network, identifying an attacking host based on a severity level of the denial of service attack from the network, wherein the attacking host is identified by an identifying attack characteristic associated with one of the plurality of packets associated with the attacking host, analyzing each of the plurality of packets by a classifier to determine to which of a plurality of temporary data structures each of the plurality of packet is forwarded, forwarding each of the plurality of packets associated with the identifying attack characteristic to one of the plurality of temporary data structures matching the severity level of the denial of service attack as determined by the classifier, requesting a number of packets from the one of the plurality of temporary data structures matching the severity level by the virtual serialization queue, and forwarding the number of packets to the virtual serialization queue. | 2010-05-13 |
20100122347 | AUTHENTICITY RATINGS BASED AT LEAST IN PART UPON INPUT FROM A COMMUNITY OF RATERS - A rating option can be provided within a user interface. The rating option can permit an interface user to provide a quantitative indication regarding an option of whether a profile detailing identification data for an on-line entity is accurate. Rating input can be received using the rating option from a set of raters. An identity score that indicates a confidence level that the profile data of an on-line entity is accurate can be calculated based at least in part upon the rating input from the set of raters. In various embodiments, the identity score can also be based at least in part upon self-verification information provided by the on-line entity and information provided by one or more identity authorities. An authenticity rating based upon the calculated identity score can be presented to communicators able to interact on-line with the on-line entity. | 2010-05-13 |
20100122348 | ORIGIN AND CUSTODY OF COPIES FROM A STORED ELECTRONIC RECORD VERIFIED PAGE BY PAGE - A method of authenticating a copy of a multi-page document, which includes digitizing a said multi-page document to generate one or more digitized files that together comprise a digitized transcript. A mark that is unique to the preparer of the document, such as a signature, is prepared and digitized. The preparer of the document is allowed to deposit the digitized transcript on an online repository. The operator of the online repository immediately establishes a verification process for the deposited digitized transcript. This verification process includes associating the digitized preparer mark with the deposited digitized transcript, and freezing the transcript, by encrypting it and deriving a checksum. The verification process also include associating a repository mark with the transcript. The operator of the online repository defines, under the direction of at least the preparer of the document, security rights to limit or otherwise control access to the deposited digitized transcript. The digitized preparer mark and the digitized repository mark are allowed to appear on substantially all copies of the pages of the document only if the pages have not been altered. If carrying out the verification process verifies that the deposited digitized transcript has not been changed since the verification process was established the marks are displayed with the unaltered page. This display whether the pages are displayed on a monitor or printed in paper form. Each page with this display is thus authenticated as to origin and custody apart from the other pages or the transcript as a whole. | 2010-05-13 |
20100122349 | Systems and methods for preventing unauthorized use of digital content - Theft, distribution, and piracy of digital content (software, video, audio, e-books, any content of any kind that is digitally stored and distributed) is generally accomplished by copying it, if possible, or, if it is protected from being copied in any fashion, such piracy is based upon a number of reverse engineering techniques. Aside from the straightforward copying of unprotected content, all of these other methods require first an understanding of the protective mechanism(s) guarding the content, and finally an unauthorized modification of that protection in order to disable or subvert it. Methods which prevent a skilled individual from using reverse engineering tools and techniques to attain that level of understanding and/or prevent anyone from performing such modifications can offer significant advantages to content creators who wish to protect their products. | 2010-05-13 |
20100122350 | PASSWORD METHODS AND SYSTEMS FOR USE ON A MOBILE DEVICE - Systems and methods for operation upon a mobile device to handle a duress situation caused by another person. An input password is received from a user. The input password is decoded by the device. Responsive to the input password being a duress indication, a duress operation is performed to protect data on the mobile device. | 2010-05-13 |
20100122351 | Software Application Framework for Network-Connected Devices - A facility for provisioning and managing registered applications is described. Registered applications can be downloaded to a mobile device from an application provisioning server. When the download is complete, the mobile device may begin execution of the registered application. However, at least portions of the registered application cannot be executed by the mobile device without first passing control to an application provisioning server via a network connection. Upon receiving temporary control of the registered application, the application provisioning server can perform tasks such as license verification and other tasks before turning control of the application back to the mobile device. | 2010-05-13 |
20100122352 | Method for Operating an Installation Using Data Protected Against Unauthorized Use - A method and a device for operating a technical installation using data from a third party are provided, the data being protected against unauthorized use. A first and a second rights object are used for protecting the data, the first rights object specifying an authorized use of the data with a variable not defined in respect of its value and the second rights object defining a value for the variable. | 2010-05-13 |
20100122353 | METHODS AND SYSTEMS OF DIGITAL RIGHTS MANAGEMENT FOR INTEGRATED CIRCUITS - Methods for remote activation and permanent or temporary deactivation of integrated circuits (IC) for digital rights management are disclosed. Remote activation enables designers to remotely control each IC manufactured by an independent silicon foundry. Certain embodiments of the invention exploit inherent unclonable variability in modern manufacturing for the creation of unique identification (ID) and then integrate the IDs into the circuit functionality. Some of the objectives may be realized by replicating a subset of states of one or more finite state machines and by superimposing additional state transitions that are known only to the designer. On each chip, the added transitions signals are a function of the unique IDs and are thus unclonable. The method and system of the invention is robust against operational and environment conditions, unclonable and attack-resilient, while having a low overhead and a unique key for each IC with very high probability. | 2010-05-13 |
20100122354 | CDC6S AS MODIFIERS OF THE PTEN/AKT PATHWAY AND METHODS OF USE - Human CDC6 genes are identified as modulators of the PTEN/AKT pathway, and thus are therapeutic targets for disorders associated with defective PTEN/AKT function. Methods for identifying modulators of PTEN/AKT, comprising screening for agents that modulate the activity of CDC6 are provided. | 2010-05-13 |
20100122355 | Transgenic Reporter Mouse and Method for Use - A transgenic mammal, including a transgenic mouse, whose genome comprises a transgene, said transgene comprises a neutrophil gelatinase-associated lipocalin (NGAL) promoter gene operably linked to at least one sequence encoding at least one of a fluorescent or bioluminescent protein, wherein the NGAL promoter gene expression in the mouse can be assayed by bioluminescence or fluorescence imaging. | 2010-05-13 |
20100122356 | PIG MODEL FOR PSORIASIS - The present invention relates to a genetically modified pig as a model for studying psoriasis. The modified pig model displays one or more phenotypes associated with psoriasis. Disclosed is also a modified pig comprising a mutation in the endogenous ILK-I Ra, JunB/cJun, CD18, IKK2, and/or LIG1 gene, and/or a human, porcine and/or murine PPARs, PPAR-δ, lκB-α, STAT3c, Integrin beta 1, Integrin alpha 2, MEK1, Amphiregulin, BMP-6, VEGF, JunBΔec-JunΔep, IL-I a, TGF.beta 1, CD18 hypo, Cre/lkk2FL/FL, Dsg1, SCCE, TGF-a, TNF-a, IL-20, IFN-g, LIG1 KO, KGF, IL-6, PAFR1 Cre/lkk2FL/FL, IL1 R, Dsg3, IFN-gamma, p40, ILI Ra, IKK2, JunB/c-Jun, and/or LIG1 gene, transcriptional and/or translational product or part thereof. The invention further relates to methods for producing the modified pig; and methods for evaluating the effect of a therapeutical treatment of psoriasis, for screening the efficacy of a pharmaceutical composition, and a method for treatment of human being suffering from psoriasis are disclosed. | 2010-05-13 |
20100122357 | HUMAN ALBUMIN ANIMAL MODELS FOR DRUG EVALUATION, TOXICOLOGY AND IMMUNOGENICITY STUDIES - An animal model is provided which is genetically engineered to express human serum albumin, and such animals may be advantageously used in assessing drugs, vaccines or other therapeutic compounds that may be used in humans. In addition, an animal model is provided which does not manufacture its own albumin and which has been injected with human serum albumin. Through the use of these animal models, drugs and other chemicals can be more accurately assessed in physiological environments that reflect the conditions to be expected in humans, and such models will be useful in assessing new drugs and evaluating toxic substances for potential dangers as carcinogens, mutagens, etc. Other applications include evaluating immunological properties of various albumin-engineered proteins which might be administered to humans as therapeutics or vaccines, and research of disease states, such as genetic diseases, to provide further insight in treating these diseases. | 2010-05-13 |
20100122358 | H-Chain-only antibodies - The invention relates to mice having functionally silenced endogenous lambda (λ) and kappa (κ) L-chain loci, comprising antibody-producing cells in which the C | 2010-05-13 |
20100122360 | Organ regeneration method utilizing blastocyst complementation - An object of the present invention is to produce a mammalian organ having a complicated cellular composition composed of multiple kinds of cells, such as kidney, pancreas, thymus and hair, in the living body of a non-human animal. The inventors of the present invention applied the chimeric animal assay described above, to a novel solid organ production method. More specifically, the inventors has shown that a model mouse which is deficient of kidney, pancreas, thymus or hair due to the dysfunction of the metanephric mesenchyme that is differentiated into most of an adult kidney, is rescued by blastocyst complementation by the chimeric animal assay, and whereby a kidney, a pancreas, thymus or hair can be newly produced. | 2010-05-13 |
20100122361 | HUMANISATION OF ANIMALS - The present invention relates to the generation of transgenic animal cells and/or animals in which a large portion of a host animal's genome has been replaced with an equivalent syntenic portion of nucleic acid from the genome of a different organism. | 2010-05-13 |
20100122362 | CELLS EXPRESSING ALPHA-SYNUCLEIN AND USES THEREFOR - Disclosed are mammalian neuronal cells expressing alpha synuclein as well as methods of screening to identify compounds that decrease toxicity induced by alpha synuclein expression. Compounds identified by such screens can be used to treat or prevent synucleinopathies such as Parkinson's disease, familial Parkinson's disease, Lewy body disease, the Lewy body variant of Alzheimer's disease, dementia with Lewy bodies, multiple system atrophy, or the Parkinsonism-dementia complex of Guam. | 2010-05-13 |
20100122363 | Certain human genomic DNA associated with total red-green colorblindness - Disclosed is human genomic DNA having the following STR marker profile: | 2010-05-13 |
20100122364 | METHOD OF CONSTRUCTING NUCLEUS-IMPLANTED EGG, PARTHENOGENETIC EMBRYO AND PARTHENOGENETIC MAMMAL - Disclosed is a method for constructing a nucleus-implanted egg, a parthenogenetic embryo and for producing a parthenogenetic mammal each having 2 haploid genome sets originating in mammalian ova, and provides methods of constructing a nucleus-implanted egg having a haploid genome set derived from primitive ovarian follicle egg (ng ovum) and a haploid genome set from MII phase (second meiosis metaphase) egg (fg ovum), a parthenogenetic embryo and a parthenogenetic mammal, including steps (1) introducing ng ovum into a nucleus-deleted deleted germinal vesicle stage (GV) egg, developing the obtained egg to MII phase by in vitro maturing and culturing to prepare a first nucleus-implanted egg, and (2) extracting MII phase chromosome from the first nucleus-implanted egg and introducing it into other fg ovum to prepare a second nucleus-implanted egg, wherein a ng or fg ovum from which an imprinted gene undergoing epigenetic modification during sperm generation is used. | 2010-05-13 |
20100122365 | OPTIMIZING GLYCAN PROCESSING IN PLANTS - The invention is directed to methods for optimizing glycan processing in organisms (and in particular, plants) so that a glycoprotein having complex type bi-antennary glycans and thus containing galactose residues on both arms and which are devoid of (or reduce in) xylose and fucose can be obtained. The invention is further directed to said glycoprotein obtained and host system comprising said protein. | 2010-05-13 |
20100122366 | DEVELOPMENT OF CONTROLLED TOTAL VEGETATIVE GROWTH FOR PREVENTION OF TRANSGENE ESCAPE FROM GENETICALLY MODIFIED PLANTS AND FOR ENHANCING BIOMASS PRODUCTION - Genes can be introduced into plants that confer desirable traits such as, drought and stress tolerance, insect and pest resistance, as well as environmental qualities such as phyto-remediation. However, possibility for transgene escape to wild and non-transformed species raises commercial and ecological concerns. Disclosed herein are methods and compositions for generating plants with total vegetative growth for the reduction, and in some examples prevention of, transgene escape. The same methods and compositions can also be used to increase biomass production in a plant. | 2010-05-13 |
20100122367 | Dominant Gene Suppression Transgenes and Methods of Using Same - Pairs of plants are provided in which complementing constructs result in suppression of a parental phenotype in the progeny. Methods to generate and maintain such plants and methods of use of said plants, are provided, including use of parental plants to produce sterile plants for hybrid seed production. Also provided are methods for maintaining a homozygous recessive condition and for repressing transmission of transgenes. | 2010-05-13 |
20100122368 | Switchgrass Cultivar EG1101 - A switchgrass cultivar designated EG1101 is disclosed. Also disclosed are seeds of switchgrass cultivar EG1101, plants of switchgrass EG1101, plant parts of switchgrass cultivar EG1101 and methods for producing a switchgrass plant produced by crossing switchgrass cultivar EG1101 with itself or with another switchgrass variety. Methods are also described for producing a switchgrass plant containing in its genetic material one or more transgenes and to the transgenic switchgrass plants and plant parts produced by those methods. Switchgrass cultivars or breeding cultivars and plant parts derived from switchgrass variety EG1101, methods for producing other switchgrass cultivars, lines or plant parts derived from switchgrass cultivar EG1101 and the switchgrass plants, varieties, and their parts derived from use of those methods are described herein. Hybrid switchgrass seeds, plants and plant parts produced by crossing the cultivar EG1101 with another switchgrass cultivar are also described. | 2010-05-13 |
20100122369 | Switchgrass Cultivar EG1102 - A switchgrass cultivar designated EG1102 is disclosed. The invention relates to the seeds of switchgrass cultivar EG1102, to the plants of switchgrass EG1102, to plant parts of switchgrass cultivar EG1102 and to methods for producing a switchgrass plant produced by crossing switchgrass cultivar EG1102 with itself or with another switchgrass variety. The invention also relates to methods for producing a switchgrass plant containing in its genetic material one or more transgenes and to the transgenic switchgrass plants and plant parts produced by those methods. This invention also relates to switchgrass cultivars or breeding cultivars and plant parts derived from switchgrass variety EG1102, to methods for producing other switchgrass cultivars, lines or plant parts derived from switchgrass cultivar EG1102 and to the switchgrass plants, varieties, and their parts derived from use of those methods. The invention further relates to hybrid switchgrass seeds, plants and plant parts produced by crossing the cultivar EG1102 with another switchgrass cultivar. | 2010-05-13 |
20100122370 | GENETIC LOCI ASSOCIATED WITH CELL WALL DIGESTIBILITY IN MAIZE - The invention relates to methods and compositions for identifying maize plants that have increased cell wall digestibility. The methods use molecular markers to identify and select plants with increased cell wall digestibility or to identify and counter-select plants with decreased cell wall digestibility. Maize plants generated by the methods of the invention are also a feature of the invention. | 2010-05-13 |
20100122371 | NOVEL RUCOLA PLANTS WITH CYTOPLASMIC MALE STERILITY (CMS) - The present invention discloses rucola plants, including an | 2010-05-13 |
20100122372 | GENETIC LOCI ASSOCIATED WITH IRON DEFICIENCY TOLERANCE IN SOYBEAN - The invention relates to methods and compositions for identifying soybean plants that are tolerant, have improved tolerance or are susceptible to iron deficient growth conditions. The methods use molecular genetic markers to identify, select and/or construct disease-tolerant plants or identify and counterselect disease-susceptible plants. Soybean plants that display tolerance or improved tolerance to | 2010-05-13 |
20100122373 | Nucleic acid molecules and other molecules associated with plants - The present invention is in the field of plant genetics. More specifically the invention relates to nucleic acid molecules and nucleic acid molecules that contain markers, in particular, single nucleotide polymorphism (SNP) and repetitive element markers. In addition, the present invention provides nucleic acid molecules having regulatory elements or encoding proteins or fragments thereof. The invention also relates to proteins and fragments of proteins so encoded and antibodies capable of binding the proteins. The invention also relates to methods of using the nucleic acid molecules, markers, repetitive elements and fragments of repetitive elements, regulatory elements, proteins and fragments of proteins. | 2010-05-13 |
20100122374 | Disease resistance in plants by introducing transcription factor gene - The present inventors analyzed genes involved in plant disease resistance. As a result, they discovered the transcription factor gene OsWRKY45, which is induced in leaf blades of rice plants by activating the systemic acquired resistance (SAR) that plants inherently have, i.e., by treating rice plants with benzothiadiazole (hereafter may be abbreviated as BTH), which is an agent thought to induce disease resistance in plants. It was further discovered that rice blast disease resistance and rice bacterial leaf blight resistance were markedly improved by reintroducing the gene into rice plants and constitutively expressing it. | 2010-05-13 |
20100122375 | COMPOSITIONS AND METHODS FOR ENHANCING DISEASE RESISTANCE IN PLANTS - Compositions and methods for enhancing disease resistance in plants by modulating levels or activities of GmUBox1 polynucleotides and polypeptides are provided. Transformed plants, plant cells, tissues, and seed are also provided having enhanced disease resistance. | 2010-05-13 |
20100122376 | METHODS OF ENHANCING THE RESISTANCE OF PLANTS TO BACTERIAL PATHOGENS - Methods are provided for enhancing the resistance of plants to bacterial pathogens. The methods involve transforming a plant with a polynucleotide molecule comprising a plant promoter operably linked to a nucleotide sequence that encodes a plant receptor that binds specifically with bacterial elongation factor-Tu. Further provided are expression cassettes, transformed plants, seeds, and plant cells that are produced by such methods. | 2010-05-13 |
20100122377 | LUNARIA ANNUA,CARDAMINE GRAECA AND TEESDALIA NUDICAULIS FAE GENES AND THEIR USE IN PRODUCING NERVONIC AND EICOSENOIC ACIDS IN SEED OILS - This invention relates to nucleic acid sequences coding for a | 2010-05-13 |
20100122378 | TRUNCATED ALTERNAN SUCRASE CODING NUCLEIC ACID MOLECULES - The present invention relates to nucleic acid molecules which code for a truncated alternan sucrase. The invention further relates to truncated alternan sucrases, to vectors, to host cells and to plant cells transformed with the nucleic acid molecules described, and to plants comprising these cells. The present invention furthermore relates to novel alternan polymers with advantageous properties and to methods for their production. | 2010-05-13 |
20100122379 | Active Ingredient Compositions for Plant Protection - The present invention relates to novel active substance compositions for plant protection in the form of finely divided active-substance-containing particles which compositions comprise
| 2010-05-13 |
20100122380 | Polypeptides having feruloyl esterase activity and polynucleotides encoding same - The present invention relates to isolated polypeptides having feruloyl esterase activity and isolated polynucleotides encoding the polypeptides. The invention also relates to nucleic acid constructs, vectors, and host cells comprising the polynucleotides as well as methods of producing and using the polypeptides. | 2010-05-13 |
20100122381 | NUCLEIC ACID MOLECULES AND OTHER MOLECULES ASSOCIATED WITH PLANTS - Expressed Sequence Tags (ESTs) isolated from soybean are disclosed. The ESTs provide a unique molecular tool for the targeting and isolation of novel genes for plant protection and improvement. The disclosed ESTs have utility in the development of new strategies for understanding critical plant developmental and metabolic pathways. The disclosed ESTs have particular utility in isolating genes and promoters, identifying and mapping the genes involved in developmental and metabolic pathways, and determining gene function. Sequence homology analyses using the ESTs provided in the present invention, will result in more efficient gene screening for desirable agronomic traits. An expanding database of these select pieces of the plant genomics puzzle will quickly expand the knowledge necessary for subsequent functional validation, a key limitation in current plant biotechnology efforts. | 2010-05-13 |
20100122382 | Cell Cycle Genes and Related Methods - Novel plant polysaccharide synthesis genes and polypeptides encoded by such genes are provided. These genes and polynucleotide sequences are useful regulating polysaccharide synthesis and plant phenotype. Moreover, these genes are useful for expression profiling of plant polysaccharide synthesis genes. The invention specifically provides cell cycle polynucleotide and polypeptide sequences isolated from | 2010-05-13 |
20100122383 | INSECT RESISTANT PLANT - The present invention relates to novel pepper plants resistant to insects, and to seeds and fruits of said plants. The present invention also relates to methods of making and using such plants and their fruits. The invention further relates to markers and the use thereof in marker assisted breeding and for identifying the insect resistance trait. In particular, the present invention provides a cultivated | 2010-05-13 |
20100122384 | Nucleic Acid Molecules and Other Molecules Associated with Plants - Expressed Sequence Tags (ESTs) isolated from cotton are disclosed. The ESTs provide a unique molecular tool for the targeting and isolation of novel genes for plant protection and improvement. The disclosed ESTs have utility in the development of new strategies for understanding critical plant developmental and metabolic pathways. The disclosed ESTs have particular utility in isolating genes and promoters, identifying and mapping the genes involved in developmental and metabolic pathways, and determining gene function. Sequence homology analyses using the ESTs provided in the present invention, will result in more efficient gene screening for desirable agronomic traits. An expanding database of these select pieces of the plant genomics puzzle will quickly expand the knowledge necessary for subsequent functional validation, a key limitation in current plant biotechnology efforts. | 2010-05-13 |
20100122385 | METHOD AND APPARATUS OF OPERATING A SCANNING PROBE MICROSCOPE - An improved mode of AFM imaging (Peak Force Tapping (PFT) Mode) uses force as the feedback variable to reduce tip-sample interaction forces while maintaining scan speeds achievable by all existing AFM operating modes. Sample imaging and mechanical property mapping are achieved with improved resolution and high sample throughput, with the mode workable across varying environments, including gaseous, fluidic and vacuum. | 2010-05-13 |
20100122386 | DRIVING APPARATUS - A driving apparatus ( | 2010-05-13 |
20100122387 | Strawberry plant named 'Reliance' - This invention relates to a new and distinct variety of strawberry plant named ‘RELIANCE’. This new strawberry plant named ‘RELIANCE’ is primarily adapted to the growing conditions of the central coast of California, and is primarily characterized by its large to very large fruit size; red to dark red fruit color; high productivity; medium sized plant; calyx that tends to be more equal to the diameter of the fruit; uniformly shaped, conical berries with good flavor; and relatively short fruiting trusses | 2010-05-13 |
20100122388 | Sweetpotato CX-1 a high dry matter processing variety - This disclosure relates to CX-1, a new and distinct variety of sweetpotato, | 2010-05-13 |
20100122389 | Variety of dicentra plant named 'Red Fountain' - A new and distinct | 2010-05-13 |