20th week of 2012 patent applcation highlights part 70 |
Patent application number | Title | Published |
20120124613 | CONTENT ENTITLEMENT DETERMINATIONS FOR PLAYBACK OF VIDEO STREAMS ON PORTABLE DEVICES - Video content is streamed to portable devices based on an entitlement determination that includes determining the location of the portable device. Channel listings available for the portable device may be filtered based on the determined entitlements. A device may determine an indication of a location of the portable device and determine entitlements defining which of the plurality of video content items are permitted to be viewed by the portable device, where the entitlements are determined based at least on the indication of the location of the portable device. The device may further transmit, to the portable device, a listing of the plurality of video content items, filtered based on those of the plurality of video content items that are permitted to be viewed by the portable device, as determined by the entitlements. | 2012-05-17 |
20120124614 | ACTIVATING LICENSABLE COMPONENT USING AGGREGATING DEVICE IN HOME NETWORK - An aggregation device in a home network accumulates information from audio video apparatuses in the network that the apparatuses require enablement of respective licensable components for which no license event has yet occurred. The aggregation device sends an indication of the license events to a server so that appropriate royalties may be paid post-sale of the various devices. | 2012-05-17 |
20120124615 | IMAGE DISPLAY APPARATUS AND METHOD FOR OPERATING THE SAME - An image display device and a method for operating the same is disclosed. The method of controlling the display device may include displaying a video on the display received through a channel of a broadcast signal tuned by a tuner or over a network. The first and second multifunctional menu screens may be configured to include at least one of a first card object configured to display a scaled image of the video, a second card object that includes at least one link to tune to one or more channels of the broadcast signal or the network, or a third card object that includes at least one link for connecting to a content provider or to a storage device, wherein the first multifunctional menu screen is configured to be different than the second multifunctional menu screen. The configured first or second multifunctional menu screen may be displayed in response to a login request to a corresponding user account, wherein the first multifunctional menu screen may be associated with a first user account and the second multifunctional menu screen may be associated with a second user account. | 2012-05-17 |
20120124616 | MOBILE INTERNET PROTOCOL TELEVISION SYSTEM AND METHOD THEREOF - Disclosed is a mobile Internet protocol television (IPTV) system providing a supplementary service added to a broadcasting service. The mobile IPTV system includes a service guide server providing programming information of an additional service, a media server providing streaming of contents for a supplementary service, a supplementary service server providing control for the supplementary service, and a mobile IPTV management server performing user authentication for the supplementary service. In this case, the mobile IPTV management server, the media server, the service guide server and the supplementary service server are connected to each other via a dedicated wireless IP network. | 2012-05-17 |
20120124617 | System and Method for Delivering Advertising to Members of a Pseudo-Social Network - A system and method for transmitting advertising to the members of a pseudo-social network are provided. The system and method comprise receiving a plurality of records corresponding to the members of the pseudo-social network and identifying a dominant member of the pseudo-social network. An advertisement for a product, service, business, or brand comprising review information authored by the dominant member is created. The advertisement is transmitted to the members of the pseudo-social network. | 2012-05-17 |
20120124618 | VIRTUAL INSERTION OF ADVERTISEMENTS - A device includes a communication interface and one or more processors. The communication interface may receive a playlist that lists segments of a content stream in an order the segments are to be recombined, receive advertisement information that describes an advertisement, receive a breakpoint, and send a revised playlist to a remote server. The one or more processors may generate the revised playlist based on the playlist, the advertisement information, and the breakpoint. The revised playlist may include references to the segments and the advertisements. | 2012-05-17 |
20120124619 | LOG PROCESSING - Set top box logs are received from a television provider and processed to identify channel tunes and channel tune times. The channel tunes and channel tune times of the log data can be compared to expected air times of television advertisements on channels, and an impression values, e.g., projected viewers, can be generated for each television advertisement. | 2012-05-17 |
20120124620 | Information Processing Apparatus and Information Processing Method - An information apparatus is provided with: a comment processing unit that acquires, from an external posting site, a comment of a viewer by using a tag as a search key, the comment is a viewer's feedback on the content of a program being viewed and related to a tag for grouping with other comments; and a display processing unit that generates data to be displayed on a screen, the data include image of a program being broadcast by a first broadcasting station and at least one comment for a program being broadcast by a second broadcasting station different from the first broadcasting station. | 2012-05-17 |
20120124621 | FIELD OF PROGRAMME DELIVERY - A receiver is disclosed, comprising means for receiving a programme stream, and means for replacing portions of the programme stream with a locally stored programme. Other aspects of the invention are also presented. | 2012-05-17 |
20120124622 | SYSTEM AND METHOD OF RENDERING ADVERTISEMENTS BY EMPLOYING PAUSED SCREEN OF TELEVISION - Methods are disclosed for delivering targeted advertisements to a user using a television system including a remote control device. Embodiments for identifying a user from a group of users are disclosed. One embodiment is disclosed by utilizing a remote control with a plurality numeric buttons for selecting a channel and also for identifying a user. | 2012-05-17 |
20120124623 | COMMUNICATIONS SYSTEM - Supplementary data associated with a broadcast transmission ( | 2012-05-17 |
20120124624 | SYSTEMS AND METHODS FOR PROVIDING INTERACTIVE MEDIA GUIDANCE ON A WIRELESS COMMUNICATIONS DEVICE - A wireless communications device provides users with opportunities to access interactive media guidance or other applications and to control interactive media guidance applications running on user equipment. The wireless communications device may have a touch-sensitive screen with controls that are coordinated with the features of the interactive media guidance or other applications. The wireless communications device may function as a remote controller for user equipment. | 2012-05-17 |
20120124625 | SYSTEM AND METHOD FOR SEARCHING AN INTERNET NETWORKING CLIENT ON A VIDEO DEVICE - A system and method for enabling a user to display and interact with a social networking structure on a video device connected to a network enabled host device is provided. A user interface (UI) | 2012-05-17 |
20120124626 | PROGRAM INFORMATION DISPLAY DEVICE, DISPLAY METHOD, AND PROGRAM - Provided is a program information display device configured to display an electronic program guide including a program cell defined by a time axis and a channel axis on the basis of program information including at least a broadcast time and a channel number, the device characterized by comprising a display controller configured to perform such a control that an attribute display region for a region of the program cell is disposed outside the region of the program cell, the attribute display region indicating an attribute of a program with use of a color corresponding to the attribute of the program and allowing the attribute information to be identified. | 2012-05-17 |
20120124627 | TERMINAL FOR REPEATING THROUGH MBS COMMUNICATION NETWORK AND METHOD OF REPEATING USING THE SAME - There is provided a method where a terminal amplifies an MBS signal that the terminal receives using a terminal in an MBS service, transmits the amplified signal to another terminal and controls it in order to overcome the fact it is not possible to provide high quality contents over a broad area due to interference signals between MBS zones, a terminal is used as a repeater at MBS transmission time only, and an output of a repeating signal of the terminal is controlled so that an excessive interference signal for another MBS area is not generated when the terminal operates as a repeater. | 2012-05-17 |
20120124628 | METHOD FOR REQUESTING TRANSMISSION OF BROADCAST PROGRAM AND METHOD FOR TRANSMITTING BROADCAST PROGRAM - A mobile terminal constituting a multi-screen service environment in a switched digital video (SDV)-based video transmission system structure serves like a remote controller of a reception terminal having a large screen such as a TV. A broadcast channel viewed in the mobile terminal can be shared with the large screen of the TV or the like, and a program can be directly viewed in the large screen of the TV or the like based on program guide information received by the mobile terminal. | 2012-05-17 |
20120124629 | Managing Bandwidth in an IPTV Environment - Bandwidth in an IPTV environment is managed by determining when the available bandwidth may be exceeded if a new video stream is added, and, prior to exceeding the available bandwidth, choosing a particular video stream to halt. The user of the particular video stream is then asked for permission to halt the particular video stream and then the video stream is halted before starting to receive the new video stream. | 2012-05-17 |
20120124630 | METHODS AND SYSTEMS FOR MEDIA CONSUMPTION - Methods and apparatus for increasing media consumption are disclosed. The present invention can provide viewers increased access to content of interest across various platforms, such as online articles, online audio and video clips, and television and radio broadcasts. In an embodiment, an individual viewing content online, such as a news article, is given a link. The link provides the viewer access to a list of content related to the article being viewed. The related content is not limited to the platform related content across, and allows the user to view the content, automatically set the content to be recorded by a digital video recorder, or reserve the content for future viewing. Accordingly, by providing the user with convenient access to content across platforms, based on their interests, they are more given media content they are more likely to enjoy. Accordingly, viewership of this content will increase, through this connection of individuals with content that aligns with their interests. | 2012-05-17 |
20120124631 | Content upload method and content delivery function entity - The present disclosure discloses a method for uplinking contents and a content delivery function entity. The method is used for uploading the contents or uplinking a media stream generated by a UE to one or more CDN nodes of CDN, and comprises the following steps: after receiving a session initiation request for uploading contents or uplinking a media stream, allocating by a CDN control function entity one or more CDN nodes, and sending a session request to a cluster control function entity of the CDN node; selecting, by the cluster control function entity which receives the session request, a content delivery function entity, establishing a session for uploading the contents or uplinking the media stream between itself and the selected content delivery function entity, and returning session acknowledgement information to the CDN control function entity; and returning, by the CDN control function entity, the received acknowledgement information to a user equipment; uploading the contents or uplinking the media stream according to the acknowledgement information by the user equipment to each content delivery function entity selected by the cluster control function entity. According to the present disclosure, the content delivery network in the next generation network can support user-generated contents. | 2012-05-17 |
20120124632 | SYSTEMS AND METHODS FOR CUSTOMIZING CHANNEL MAPS - Systems and methods for modifying channel maps are provided. A predetermined channel map for a customer of a service provider may be identified. The predetermined channel map may include information mapping at least one of frequencies and program identifiers included in a broadband communications signal to a plurality of channels. The broadband communications signal may be output by the service provider. Based upon information associated with the customer, the predetermined channel map may be modified. Information associated with the modified channel map may then be output for communication via a service provider network to a programming processing component associated with the customer. | 2012-05-17 |
20120124633 | Wireless Video Streaming Quality Management for Bandwidth Constrained Cellular Network - A method for wireless video streaming includes determining a backhaul bandwidth of a base station and ongoing traffic between a plurality of wireless clients and the base station, determining a video transcoding policy for each of the wireless clients based on a service agreement of each wireless client, decoding network signaling information, extracting a plurality of video streams based on the decoded network signaling information, and transcoding the plurality of video streams simultaneously upon determining that the ongoing traffic exceeds the backhaul bandwidth. Transcoding is based on a video transcoding policy of a receiving wireless client, video properties of a video stream being transcoded, and the decoded network signaling information. | 2012-05-17 |
20120124634 | VIDEO SERVER AND VIDEO DATA TRANSMISSION METHOD - According to one embodiment, a video server includes an encoder, a transmission module, storage modules, and a controller. The encoder outputs a request in response to encoding a video signal. The controller confirms whether or not the number of outputs of video data and a video file to the storage modules within a time interval is less than a limitation number in response to the request. The controller selects the best storage module to store the encoded video data from among the storage modules if the number of outputs is less than the limitation number. The apparatus controller transmits an instruction to the encoder designating the selected storage module as a transmission destination. The encoder outputs the encoded video data designating the transmission destination. The transmission module transmits the output video data to the transmission destination. The storage modules designated as the transmission destination stores the transmitted video data. | 2012-05-17 |
20120124635 | METHOD AND SYSTEM FOR TRANSMITTING CHANNELS TO AT LEAST ONE DIGITAL VIDEO RECORDER - A method and system for transmitting channels to at least one digital video recorder is described. A server receives at least one recording schedule from a plurality of digital video recorders (step | 2012-05-17 |
20120124636 | System and Method for Selectively Transcoding Signal from One Format to One of Plurality of Formats - A device is provided for use with an input signal and a selecting signal. The input signal has a first format, and the selecting signal has a first state and a second state. The device comprises a receiving portion and a transcoder portion. The receiving portion can receive the input signal and output a received signal. The transcoder portion is arranged to receive the selecting signal and can output a first transcoded signal when the selecting signal is in the first state and can output a second transcoded signal when the selecting signal is in the second state. The first transcoded signal is based on the received signal and is in a second format. The second transcoded signal is based on the received signal and is in a third format, wherein the first format is different from the second format, the first format is different from the third format and the second format is different from the third format. | 2012-05-17 |
20120124637 | SECURE ACCESS TO HEALTHCARE INFORMATION - A system and method for providing or exchanging healthcare information (e.g., medical information) to authorized users in a secure manner. The method is implemented in a computer infrastructure having computer executable code tangibly embodied on a computer readable storage medium having programming instructions operable to: assign identification information to a plurality of users and a plurality of items; associate the identification information of a user of the plurality of users with one or more items of the plurality of items; set-up security policies including predetermined locations, within predetermined stages within a sequence and during predetermined times; and provide the user access to the one or more items when there is a matching between the identification information of the user and the one or more items, and all of the security policies associated with the user and the one or more of the plurality of items are met. | 2012-05-17 |
20120124638 | SYNDICATION INCLUDING MELODY RECOGNITION AND OPT OUT - A syndication system facilitates rights management services between media content owners and media hosting services that elect to participate in the syndication system and mutually elect to participate with each other. The syndication system utilizes a content recognition system to identify hosted media content and ownership rights associated with the hosted content. By applying melody recognition, the content recognition system can identify compositions embodied in hosted media content even when these compositions do not precisely match any known sound recording. Thus, the content recognition system is beneficially able to detect, for example, recorded cover performances and recorded live performances embodied in hosted media content. Once identified, ownership information is determined and the syndication system can facilitate rights management policies associated with the content such as monetizing or blocking the protected content. | 2012-05-17 |
20120124639 | VALIDATION OF CONSISTENCY AND COMPLETENESS OF ACCESS CONTROL POLICY SETS - Consistency and/or completeness of access control policy sets may be validated and/or verified. An access control policy set may be received. The access control policy set may include access control policies that allow or disallow access to computing resources. Individual ones of the access control policies may include one or more attributes. The one or more attributes of a given access control policy may be ordered into a predetermined order responsive to the one or more attributes of the given access control policy lacking the predetermined order. A decision tree may be generated based on the access control policies. The decision tree may be analyzed to determine one or more of (1) whether one or more of the access control policies are incomplete, or (2) whether one or more of the access control policies are inconsistent with one or more other ones of the access control policies. | 2012-05-17 |
20120124640 | DATA SOURCE BASED APPLICATION SANDBOXING - A computing device and a method for a computing device to control access to data stored on a data store of the device. An access component of the device having control over access to the data. The access component being operative to receive a request for data from a requesting component, identify an assigned access domain of the requesting component and an assigned data domain of the requested data and determine whether the requesting component is authorized to access the data by comparing the assigned access domain and the data domain with permissions specified in a security policy. If the assigned access domain is authorized to access the data domain, the access component may provide access to the requested data. | 2012-05-17 |
20120124641 | METHODS RELATED TO NETWORK ACCESS REDIRECTION AND CONTROL AND DEVICES AND SYSTEMS UTILIZING SUCH METHODS - In illustrative embodiments, methods in accordance with the present invention utilize a thin kernel module operating in the kernel space of an operating system to redirect all TCP flows to user space for application analysis and processing. Redirected data is presented to the user space application as a data stream, allowing the processing of information contained within the data stream from the user space on a mobile device. This allows the user space application to inspect and take action on incoming data before allowing the data to continue to pass through the device. This enables parental controls, firewalls, real-time anti-virus scanning, tethering/hot-spot, bandwidth optimization, and similar programs to effectively operate across different mobile devices as user downloadable/actuatable applications. | 2012-05-17 |
20120124642 | APPARATUS AND METHOD FOR SELECTIVELY DECRYPTING AND TRANSMITTING DRM CONTENTS - Provided are apparatus and method for selectively decrypting and transmitting DRM contents. A policy storing unit stores information on devices allowed for decryption of contents. A policy processing unit determines whether a target device, to which an encrypted content is transmitted, is a device allowed for decryption based on the information stored in the policy storing unit. A decryption unit decrypts the encrypted content. And a control unit controls the decryption unit to decrypt the encrypted content when the target device is the device allowed for decryption. | 2012-05-17 |
20120124643 | Systems and Methods for Analyzing Application Security Policies - A system and method for analyzing application security policies is provided. One or more application security policies are retrieved. An optimized policy is then generated utilizing the one or more application security policies. One or more queries related to the one or more application security policies are received. The one or more queries are decomposed. The one or more decomposed queries are then processed utilizing the optimized policy. | 2012-05-17 |
20120124644 | Input to Locked Computing Device - The subject matter of this specification can be embodied in, among other things, a method that includes receiving at a computing device that is in a locked state, one or more user inputs to unlock the device and to execute at least one command that is different from a command for unlocking the device. The method further includes executing in response to the user inputs to unlock the device an unlocking operation to convert the device from a locked state to an unlocked state. The method further includes executing the at least one command in response to receiving the user inputs to execute the at least one command. The at least one command executes so that results of executing the at least one command are first displayed on the device to a user automatically after the device changes from the locked state to the unlocked state. | 2012-05-17 |
20120124645 | SYSTEM ARCHITECTURE FOR DMZ EXTERNAL IP ADDRESSES - A system of a first network, which is intermediate a second network and a third network, connects a host of the second network to a host of the third network. The system includes at least one processor programmed to receive a domain name system (DNS) request for a hostname corresponding to the host of the third network from the host of the second network. An internet protocol (IP) address of the first network allocated and an IP address of the host of the third network is determined from the hostname. The allocated IP address is mapped to the determined IP address and the allocated IP address is returned to the host of the second network in response to the DNS request. | 2012-05-17 |
20120124646 | Method and Apparatus for Authenticating Online Transactions Using a Browser - A computer-implemented method for authenticating a user using a service provider server and an authentication server, the user communicating with at least one of the service provider server and the authentication server using a user browser. The method includes requesting, using the user browser, the authenticating with the service provider server. The method also includes authenticating, using the user browser, a secure communication channel with the authentication server. The method also includes receiving, using the user browser, a Next Pre-Authentication Anchor (NPAA) value from the authentication server. The method additionally includes temporarily storing the Next Pre-Authentication Anchor (NPAA) value in a user browser cookie associated with the user browser, wherein the Next Pre-Authentication Anchor (NPAA) value is protected by employing Same Origin Policy (SOP). | 2012-05-17 |
20120124647 | METHOD AND APPARATUS FOR SMALL FOOTPRINT CLIENTS FOR OPERATOR-SPECIFIC SERVICE INTERFACES - Techniques for small footprint operator-specific network services include determining to obtain and/or process operator data that indicates an operator of a service associated with user equipment. The techniques also include determining to obtain and/or process user data that identifies a user of the user equipment for a gateway provider different from the operator and different from the user. The techniques further include determining to send, to the gateway provider through the communications network, a first message that indicates the operator data and the user data for obtaining a service with an operator-specific interface. In some embodiments, the first message is sent after a random delay to decentralize traffic at the gateway. In some embodiments, the first message is sent when a predetermined fraction of battery life at the user equipment is sufficient to send the first message. | 2012-05-17 |
20120124648 | DUAL SCREEN PC - Systems for, and methods of, enabling selective control of resource of an electronic device having a display by a controlling electronic device having a display are disclosed. Selective control of the electronic device is implemented by the electronic device via a set of control permissions for a detected controlling device, based upon an identifier of the controlling device. A controlling device can be any electronic device having a processor, a memory, a display and a communication module. Enabling selective control of the display of an electronic device having a display, by a personal computer, enables the personal computer to operate as a dual screen personal computer. | 2012-05-17 |
20120124649 | Attachment method and system for Id-Loc-Split in an NGN - This disclosure provides an attachment method and system for ID-Loc-Split in an NGN, to implement an attachment process for an IPSPLIT-based ID-Loc-Split in an NGN, which can be combined well with various existing functional entities in the NGN, wherein a user identification is represented by a Host ID, and during the attachment process, a user is located through the Host ID, and during an authentication process, a key authentication method is provided to the Host ID; when location of the user changes due to its mobility or multihoming, the Host ID does not change; the application and connection of the transport layer is bound to the user identification, such that the application and connection will not be interrupted, and an ongoing communication session and service will not be interrupted, which guarantees the security of attachment and seamless handover when the location of a host changes due to its mobility or multihoming. | 2012-05-17 |
20120124650 | Reactive Authorization for Publications - Systems and methods for reactively authorizing publication of information by a third party are coordinated through the use of a presence server. The presence server communicates with other communication nodes/devices to determine and relay publication information. Publication requests that are initially unauthorized, from the perspective of the presence server, are resolved. | 2012-05-17 |
20120124651 | SECURE AND EFFICIENT AUTHENTICATION USING PLUG-IN HARDWARE COMPATIBLE WITH DESKTOPS, LAPTOPS AND/OR SMART MOBILE COMMUNICATION DEVICES SUCH AS IPHONES - A portable apparatus is removably and communicatively connectable to a network device to communicate authentication or authorization credentials of a user in connection with the user logging into or entering into a transaction with a network site. The apparatus includes a communications port to connect and disconnect the apparatus to and from the network device and to establish a communication link with the network device when connected thereto. A processor receives a secure message from the network security server via the port. The message has a PIN for authenticating the user to the network site, and is readable only by the apparatus. The processor either transfers, via the port, the received PIN to an application associated with the network site that is executing on the network device or causes the apparatus to display the received PIN for manual transfer to the application associated with the network site. | 2012-05-17 |
20120124652 | SYNCHRONIZATION APPARATUS AND METHOD - Disclosed herein is a synchronization apparatus and method. The synchronization apparatus includes a server synchronization determination unit for determining whether synchronization with a server is possible. A device search unit searches for a communication-enabled neighboring device if it is determined that synchronization with the server is impossible. A multi-hop synchronization processing unit transmits synchronous data to the neighboring device, thus enabling synchronization with the server via the neighboring device. In the synchronization method, whether synchronization with a server is possible is determined. If it is determined that synchronization with the server is impossible, a communication-enabled neighboring device is searched for. Synchronous data is transmitted to the neighboring device, thus enabling synchronization with the server via the neighboring device. | 2012-05-17 |
20120124653 | Certificate Based Access Control in Open Mobile Alliance Device Management - A wireless communication device provides a method of certificate-based access control. Particularly, the device establishes a secure communications session with a device management server. Rather than use access control lists to control access to the functions and services on the device, however, the device uses the certificate that was employed to establish the secure session to control access. | 2012-05-17 |
20120124654 | System and method for a secure user interface - In accordance with embodiments, there are provided mechanisms for methods and systems for inputting information, such as authentication and verification information, which are meant to thwart keylogging and phishing, while also assisting in a user's recall of the required input information. In at least one embodiment, a secure virtual keyboard is generated that has less buttons or entry keys than choices for input entry. | 2012-05-17 |
20120124655 | Apparatus for connecting a human key identification to objects and content or identification, tracking, delivery, advertising, and marketing - An apparatus for connecting a human key identification to objects and content or identification, tracking, delivery, advertising, and marketing. An Independent Clearing House Agent (ICHA) server is connected to a human key server. The human key server is connected to a translation server and universal virtual world (UVW) server for the management of a plurality of methods and mechanism integrally working as one system. A virtual world airport (VWA) server is connected to a Mobile, Handheld, and Independent Device Application Development (MHIDAD) server which in turn communicates with an illumination transformer audio video manager interactive server transmitter (ITAVMIST which communicates with a Virtual Cash Virtual Currency (VCVC) server. The authentication unit also creating identification data; and sending to verification; a match combined with 9 out of 17 positive point evaluations returns, via an Internet connection to the mobile device. | 2012-05-17 |
20120124656 | Method and system for mobile device based authentication - In this specification, access may be provided to secure systems by authentication using mobile devices. Users may register a mobile device and password with an authentication system. To access a secure system, users may send a request with a registered phone number via SMS, internet or phone. In an embodiment, the authentication server system may send the token and the position of the password via SMS. Users may enter the authentication code comprising of the token and the password at the secure system. The secure system compares the authentication code with the stored authentication code to grant access to the secure system. Secure access may be used in credit card, pre-paid card, debit card or any other card transactions other financial transactions authentication, login authentication for a computer system and security access authentication. | 2012-05-17 |
20120124657 | AUTOMATED SECURITY TOKEN ADMINISTRATIVE SERVICES - This invention provides a system, method and computer program product to allow a user to access administrative security features associated with the use of a security token. The administrative security features provide the user the ability to unlock a locked security token, diagnose a security token, activate and deactivate a security token, request a replacement security token or temporary password or report the loss of a security token. The invention comprises a client application which integrates into the standard user login dialog associated with an operating system. A portion of the user dialog is linked to a remote server to access the administrative services. | 2012-05-17 |
20120124658 | System and Method for Providing Secure Data Communication Functionality to a Variety of Applications on a Portable Communication Device - A system for providing an application associated with a portable communication device the ability to communicate via a secure element. The system has a digital identifier and digital token operably associated with the application; a card services module that provides an application programming interface to the secure element; and a secure data table associated with the card services module. The secure data table includes a list of trusted applications each identifiable by paired digital identifier and token. The card services module [includes] compares the identifier and the token with each of the identifier-token pairs in the table until a match indicates the application is trusted. The card services module issues commands to the secure element based on an action requested by a trusted application in conjunction with the presentation of the digital token. A method of providing an application with the ability to communicate via secure element is also disclosed. | 2012-05-17 |
20120124659 | System and Method for Providing Diverse Secure Data Communication Permissions to Trusted Applications on a Portable Communication Device - A system for providing first and second trusted applications diverse permission to communicate via a secure element. The system comprising first digital identifier and digital token operably associated with the first trusted application; a second digital identifier and digital token operably associated with the second trusted application. The system further includes a card services module that provides an application programming interface to the secure element supported by a secure data table including first and second sets of permissions. The card services module issues one or more commands to the secure element based on a first action requested by the first trusted application in conjunction with the presentation of the first digital token only if the one or more commands will not violate the first set of permissions. A method is also disclosed. | 2012-05-17 |
20120124660 | VIRTUAL PRIVATE NETWORK NODE INFORMATION PROCESSING METHOD, RELEVANT DEVICE AND SYSTEM - A Virtual Private Network (VPN) node information processing method and a VPN node information processing device are provided, in which the method comprises: receiving an access request message sent by a node, in which the access request message at least carries authentication information, a current real Internet Protocol (IP) address, a node name and information indicating whether to accept extranet connection of the node; allocating a virtual IP address for the node when the authentication information of the node is correct; and registering the current real IP address, the node name, the information indicating whether to accept the extranet connection, and the virtual IP address of the node as registration information. Through the method and the device, when a node is added into a VPN, configuration of other nodes does not need to be adjusted. | 2012-05-17 |
20120124661 | METHOD FOR DETECTING A WEB APPLICATION ATTACK - A method of detecting a web application attack is provided. The method includes the steps of when packets forming HTTP traffic are received, a web application firewall recombining the HTTP traffic, analyzing the recombined HTTP traffic and determining whether or not the recombined HTTP traffic includes the attack-relevant content, if the recombined HTTP traffic does not include the attack-relevant content, sending the recombined HTTP traffic to a web server or a user server and normally processing the recombined HTTP traffic, and if the recombined HTTP traffic includes the attack-relevant content, detecting the recombined HTTP traffic as an attack and reprocessing the same. | 2012-05-17 |
20120124662 | METHOD OF USING DEVICE MOTION IN A PASSWORD - Processing a password in a mobile computing device may be accomplished by sensing movement of the mobile computing device by an accelerometer of the mobile computing device in three dimensional space; capturing first directional motion information representing the movement as at least a portion of an entered password; comparing the entered password to a password previously stored in the mobile computing device, the stored password comprising second captured directional motion information; and allowing access to the mobile computing device by a user when the entered password matches the stored password. The movement of the mobile computing device required for the password may be set by the user during a password training phase of operating the mobile computing device. | 2012-05-17 |
20120124663 | STORAGE DEVICE ACCESS AUTHENTICATION UPON RESUMING FROM A STANDBY MODE OF A COMPUTING DEVICE - Example embodiments disclosed herein relate to a storage device. The storage device may include a mechanism that monitors for receipt of cached authentication data from a host computing device upon resuming operation from a standby mode of the host computing device. The storage device may further include a mechanism that unlocks the storage device in response to receipt of the cached authentication data from the host computing device. In addition, the storage device may include a mechanism that monitors for receipt of re-authentication data and a mechanism that locks the storage device when a predetermined period of time has passed since resuming operation from the standby mode without receipt of the re-authentication data. Related computing devices, methods, and machine-readable storage media are also disclosed. | 2012-05-17 |
20120124664 | DIFFERENTIATING BETWEEN GOOD AND BAD CONTENT IN A USER-PROVIDED CONTENT SYSTEM - A system differentiates good content from bad content in a user-provided content system. Messages are analyzed for features that characterize messages. A feature may occur in one or more messages. A feature that has more than a threshold number of occurrences in messages in a time interval is identified for further analysis. Enhanced authentication is requested from senders of the messages with occurrences of the identified feature. Based on the rate at which senders of the messages pass authentication, the content associated with the message is determined to be good content or bad content. Subsequent messages are blocked or successfully delivered based on whether features occurring in the messages are indicative of good content or bad content. | 2012-05-17 |
20120124665 | METHOD AND APPARATUS FOR DETECTING A ROGUE ACCESS POINT IN A COMMUNICATION NETWORK - A method and apparatus for detecting a rogue access point in a communication network is described herein. The method includes a probing unit sending a pre-detection message to an associated access point in the communication network. The pre-detection message indicates a start of rogue access point detection mode and informs the associated access point not to respond to probe requests following the pre-detection message. The method further includes the probing unit broadcasting probe requests in the communication network. The probing unit detect that one or more of the plurality of access points is the rogue access point based on receiving a probe response in reply to the broadcasted probe request from the rogue access point. A method for detecting a rogue access point includes broadcasting a probe request with a proprietary information bit and detecting the rogue access point based on receiving a probe response for the broadcasted probe request. | 2012-05-17 |
20120124666 | METHOD FOR DETECTING AND PREVENTING A DDOS ATTACK USING CLOUD COMPUTING, AND SERVER - A method for detecting and preventing a Distributed Denial of Service (DDoS) attack in a cloud computing environment including a plurality of clients connected to a server, the method includes collecting, by the server, file deoxyribonucleic acid (DNA) extracted from a file currently being executed by each of the clients and traffic information about network traffic caused by the file, from each client by using an agent that is installed in the client and that monitors the file currently being executed by the client. Further, the method includes analyzing, by the server, a risk level of a DDoS attack based on whether the file DNA of the file is malicious or unidentified and based on the traffic information. Furthermore, the method includes sending a command related to whether to block the file to the client according to the analyzed risk level. | 2012-05-17 |
20120124667 | MACHINE-IMPLEMENTED METHOD AND SYSTEM FOR DETERMINING WHETHER A TO-BE-ANALYZED SOFTWARE IS A KNOWN MALWARE OR A VARIANT OF THE KNOWN MALWARE - A machine-implemented method for determining whether a to-be-analyzed software is a known malware or a variant of the known malware includes the steps of: (A) configuring a processor to execute the to-be-analyzed software, and obtain a to-be-analyzed system call sequence that corresponds to the to-be-analyzed software with reference to a plurality of system calls made in sequence as a result of executing the to-be-analyzed software; (B) configuring the processor to determine a degree of similarity between the to-be-analyzed system call sequence and a reference system call sequence that corresponds to the known malware; and (C) configuring the processor to determine that the to-be-analyzed software is neither the known malware nor a variant of the known malware when the degree of similarity determined in step (B) is not greater than a predefined similarity threshold value. | 2012-05-17 |
20120124668 | Method for Immunizing Data in Computer Systems from Corruption - A system for immunizing a computer network against adverse effects caused by the receipt of a corrupting message. Each message transfers into a protocol-based controlled environment for a specific recipient where message criteria determine whether the incoming message is deemed to be a valid or suspicious message. Transmission criteria determine the final message disposition. If the message is valid, it is delivered to a recipient computer system in the network. If the incoming message is suspicious, the message is isolated in the controlled environment where the transmission criteria may provide remote access to the recipient. | 2012-05-17 |
20120124669 | Hindering Side-Channel Attacks in Integrated Circuits - A mechanism is provided for protecting a layer of functional units from side-channel attacks. A determination is made as to whether one or more subsets of functional units in a set of functional units in the layer of functional units is performing operations of a critical nature. Responsive to a determination that there is one or more subsets of functional units that are performing the operations of the critical nature, at least one concealing pattern is generated in a concealing layer in order to conceal the operations of the critical nature being performed by each of the subset of functional units. The concealing layer is electrically and physically coupled to the layer of functional units. | 2012-05-17 |
20120124670 | ANALYZING THE SECURITY OF COMMUNICATION PROTOCOLS AND CHANNELS FOR A PASS THROUGH DEVICE - A security analyzer includes a single software application that both sends test messages to a device under analysis (DUA) and receives response messages generated by the DUA in response to the test messages. In this way, synchronization of which response messages correspond to which test messages can be reduced or avoided. The software application further determines whether the DUA operated correctly by analyzing the received response messages. | 2012-05-17 |
20120124671 | SYSTEMS AND METHODS FOR IDENTIFYING AND MITIGATING INFORMATION SECURITY RISKS - Methods and systems for Sustained Testing and Awareness Refresh against Phishing threats (STAR*Phish™) are disclosed. In an embodiment, a method assigns schemes and unique identifiers to target e-mail addresses associated with a user accounts. The method delivers e-mail messages to the targeted e-mail addresses, the e-mail messages comprising an HTTP request and a unique identifier associated with each of the user accounts. The method then receives, at a Phishing Metric Tool (PMT), a response including the unique identifier. The PMT logs training requirements for the user accounts, tracks response metrics for the training requirements, and redirects the respective HTTP requests to a phishing training tool (PTT). The PTT sends a notification of the user account identities and the unique identifiers to the PMT and returns a status for the training requirements for the user accounts. Upon completion of the training, the PMT sends completion notifications for the user accounts. | 2012-05-17 |
20120124672 | Multi-Dimensional User-Specified Extensible Narrowcasting System - Narrowcast communication to one or more narrowcast communication recipients is provided through the use of an extensible method and apparatus. A narrowcast communication sender determines a set of attributes that define who will be eligible to receive a narrowcast communication. The set of attributes characterize potential recipients according to qualities such as interests, location, or another descriptor of a potential narrowcast communication recipient. Through the use of a privacy sphere, attributes associated with the narrowcast communication are matched to the qualities of potential recipients to identify the network addresses of the narrowcast communication recipients. The narrowcast communication is then transmitted to those network addresses. The narrowcast communication can be then expired from recipients who are no longer eligible to receive it and transmitted to recipients who become eligible to receive the narrowcast communication. | 2012-05-17 |
20120124673 | TIME CHECK METHOD AND BASE STATION - A time check method and a base station are provided. The base station receives an authentication interaction message sent by an authentication interaction device; extracts time information in the authentication interaction message; and uses the time information to check local time. Before an Internet Key Exchange (IKE) connection is set up between the base station and a security gateway, relatively accurate time is obtained from an external authentication interaction device and is used for aligning the local time. Therefore, the cost of installing a clock component and a battery is saved, the time on the base station is trustworthy, and the security gateway is authenticated securely. | 2012-05-17 |
20120124674 | RIGHT MANAGEMENT APPARATUS, RIGHT MANAGEMENT PROGRAM, AND CONTENT PLAYBACK SYSTEM - In a content playback system | 2012-05-17 |
20120124675 | APPARATUS AND METHOD FOR MANAGING DIGITAL RIGHTS THROUGH HOOKING A KERNEL NATIVE API - Provided are an apparatus and method for managing digital rights. An agent unit manages application programs to which DRM is to be applied and rights to contents processed by the application programs to which DRM is to be applied, and encrypt and decrypt the contents processed by the application programs. A rights management unit authenticates a user and manages a user right to the contents processed by the application programs. A kernel API hooking unit monitors input/output of a file through hooking kernel native APIs, requests the rights management unit to verify the user right to the contents to be processed, and requests the agent unit to encrypt or decrypt the contents when the user right to the contents to be processed is verified. | 2012-05-17 |
20120124676 | QUICK PAYMENT USING MOBILE DEVICE BINDING - Methods and systems are provided for secure device binding that provides user convenience through avoiding repetitive logging in when changing apps or moving from website to website. A mobile device undergoes binding to an account so that customers do not always have to enter their password when going through a financial transaction process, on a known (e.g., registered) mobile device. A device may be bound during an initial login, and once logged in, the user can select an option to be “remembered” so that the user need not re-login on the same device for future visits with an app or to a website that shares the service provider library. | 2012-05-17 |
20120124677 | COLLECTION USER INTERFACE - Collection user interface techniques are described. In one or more implementations, a plurality of inputs are recognized as gestures received via interaction with a user interface to navigate through a file system of a computing device and select representations of objects managed by file system of the computing device, at least two of which are accessible via different devices. In response, copies of the representations are displayed by the computing device in a collection portion of the user interface. An option is output in conjunction with the collection portion by the computing device that is selectable to initiate a command to be performed using the objects that have corresponding representations included in the collection portion. | 2012-05-17 |
20120124678 | ACTIVATING LICENSABLE COMPONENT PROVIDED BY THIRD PARTY TO AUDIO VIDEO DEVICE - An audio-video display device can download from a third party server a licensable component on which a royalty is to be paid. Various methods are disclosed for accounting for royalties associated with downloading the licensable component to the client device between the third party server and a client device manufacturer server. | 2012-05-17 |
20120124679 | SYSTEM FOR IDENTIFYING CONTENT OF DIGITAL DATA - A computing system selects a portion of data of an unknown work and detects each event in the portion of data of the unknown work. An event is a perceptual occurrence in a work successively positioned in time. The system determines an event metric between each successive event in the portion of data in the unknown work and generates a list of event metrics between the events for the unknown work. The system compares the list of event metrics for the unknown work to a list of event metrics for a known work and determines the unknown work is a copy of the known work responsive to a match between the list of event metrics of the unknown work and the list of event metrics for the known work. | 2012-05-17 |
20120124680 | METHOD FOR DETECTING ABNORMALITIES IN A CRYPTOGRAPHIC CIRCUIT PROTECTED BY DIFFERENTIAL LOGIC, AND CIRCUIT FOR IMPLEMENTING SAID METHOD - In a method for detecting anomalies in a circuit protected by differential logic and which processes logic variables represented by a pair of components, a first network of cells carrying out logic functions on the first component of said pairs, a second network of dual cells operating in complementary logic on the second component, the logic functions being carried out by each pair of cells in a pre-charge phase placing the variables in a known state on input to the cells and followed by an evaluation phase where a calculation is performed by the cells, the method includes detecting an anomaly by at least one non-consistent state. | 2012-05-17 |
20120124681 | DNA FRAGMENT AND PHARMACEUTICAL COMPOSITION - Provided are a DNA fragment, a pharmaceutical composition, and the like, which can simplify the period of creating knockout animals. The DNA fragment includes: a detection sequence that codes for a detection marker other than drug resistance (preferably a visually-detectable marker); a resistance sequence that codes for a resistance marker for a drug that inhibits the proliferation of one or more species of at least prokaryotic organisms; a promoter sequence that is located upstream of the resistance sequence and functions in prokaryotic organisms; and a regulatory sequence that is located upstream of all of the above sequences and, only when inserted into a target region of the genome of at least one species of eukaryotic organism, induces the expression of a sequence located downstream. The detection sequence and the resistance sequence are arranged so as to be capable of action. | 2012-05-17 |
20120124682 | DHX36 / RHAU KNOCKOUT MICE AS EXPERIMENTAL MODELS OF MUSCULAR DYSTROPHY - The present invention provides a genetically-modified non-human animal whose somatic and germ cells contain a gene encoding an altered form of an DHX36 gene, the altered DHX36 haviang been targeted to replace a wild-type DHX36 gene into the animal or an ancestor of the animal at an embyonic stage using embryonic stem cells. An ideal use of the genetically-modified non-human animal of the invention is the use as an experimental model for muscular dystrophy, e.g. spinal muscular atrophy, to identify e.g. new treatments for muscular dystrophy and or study its pathogenesis. | 2012-05-17 |
20120124683 | Delivery method - The present invention relates, in general, to siRNA and, in particular, to a method of effecting targeted delivery of siRNAs and to compounds suitable for use in such a method. | 2012-05-17 |
20120124684 | COMPOSITIONS AND METHODS USING ALPHA BETA-CRYSTALLIN IN PROTECTING THE MYOCARDIUM FROM ISCHEMIA/REPERFUSION INJURY - The invention provides a modified version of alpha B-Crystallin (αBC), and methods for delivering this modified version of alpha B-Crystallin (αBC) to tissues and cells; the invention provides a modified version of αBC in which the serine at position 59 has been changed to glutamate to mimic phosphorylation and the serine at positions 19 and 45 have been changed to alanine to prevent phosphorylation of those residues. The invention also provides compositions and methods for ameliorating a cell from ischemia/reperfusion injury or protecting a cell from ischemia/reperfusion injury. | 2012-05-17 |
20120124685 | COMPOSITIONS AND METHODS FOR GENE EXPRESSION AND CHROMATIN PROFILING OF INDIVIDUAL CELL TYPES WITHIN A TISSUE - The present invention provides compositions, methods, and kits for generating and isolating tagged nuclei of specific cell types with a high yield and purity. The compositions, methods, and kits provided herein comprise expressing in a cell a nuclear envelope tagging fusion polypeptide comprising a nuclear envelope targeting domain and an affinity reagent binding region. In some embodiments, expression of the fusion polypeptide is under the control of a cell type-specific promoter. Some embodiments also comprise expressing in a cell a biotin ligase, wherein the affinity reagent binding region comprises a biotin ligase accepting site, and wherein at least one of the nuclear envelope tagging fusion polypeptide and the biotin ligase is expressed under the control of a cell type-specific promoter. | 2012-05-17 |
20120124686 | Site-Directed Integration of Transgenes in Mammals - The present disclosure provides a method of making a mammal (e.g., a rodent, such as a mouse) by integrating an intact polynucleotide sequence into a specific genomic locus of the mammal to result in a transgenic mammal. A transgenic mammal made by the methods of the present disclosure would contain a known copy number (e.g., one) of the inserted polynucleotide sequence at a predetermined location. The method involves introducing a site-specific recombinase and a targeting construct, containing a first recombination site and the polynucleotide sequence of interest, into the mammalian cell. The genome of the cell contains a second recombination site and recombination between the first and second recombination sites is facilitated by the site-specific, uni-directional recombinase. The result of the recombination is site-specific integration of the polynucleotide sequence of interest in the genome of the mammal. This inserted sequence is then also transmitted to the progeny of the mammal. | 2012-05-17 |
20120124687 | LOLIUM PERENNE SUBSP. STOLONIFERUM; PERENNIAL RYEGRASS WITH DETERMINATE-STOLONS - This disclosure provides perennial ryegrass plants having determinate-stolons developed by subjecting large number of perennial ryegrass plants to intense traffic. This grass can quickly repair (high regeneration potential) itself from traffic damage, and has good turf qualities compared to other perennial ryegrasses. The high regeneration potential gives it the ability to quickly repair itself from traffic damage and fill in open areas in turf. Methods of using the perennial ryegrass grass plants and seed are also provided. This grass is suitable for use in turf, for example turf that is exposed to significant traffic. This disclosure also provides methods of selecting for such grass plants. | 2012-05-17 |
20120124688 | Chives Hybrid Jeilo - A chives hybrid designated Jeilo is disclosed. The invention relates to the seeds of chives hybrid Jeilo, to the plants of chives hybrid Jeilo, and to methods for producing a hybrid plant, either inbred or hybrid, by crossing the chives hybrid Jeilo with itself or another chives plant. The invention further relates to methods for producing a chives plant containing in its genetic material one or more transgenes and to the transgenic plants produced by that method and to methods for producing other chives lines, cultivars or hybrids derived from the chives hybrid Jeilo. | 2012-05-17 |
20120124689 | PLANTS AND SEEDS OF HYBRID CORN VARIETY CH411439 - According to the invention, there is provided seed and plants of the hybrid corn variety designated CH411439. The invention thus relates to the plants, seeds and tissue cultures of the variety CH411439, and to methods for producing a corn plant produced by crossing a corn plant of variety CH411439 with itself or with another corn plant, such as a plant of another variety. The invention further relates to genetic complements of plants of variety CH411439. | 2012-05-17 |
20120124690 | PLANTS AND SEEDS OF HYBRID CORN VARIETY CH590373 - According to the invention, there is provided seed and plants of the hybrid corn variety designated CH590373. The invention thus relates to the plants, seeds and tissue cultures of the variety CH590373, and to methods for producing a corn plant produced by crossing a corn plant of variety CH590373 with itself or with another corn plant, such as a plant of another variety. The invention further relates to genetic complements of plants of variety CH590373. | 2012-05-17 |
20120124691 | PLANTS AND SEEDS OF HYBRID CORN VARIETY CH232367 - According to the invention, there is provided seed and plants of the hybrid corn variety designated CH232367. The invention thus relates to the plants, seeds and tissue cultures of the variety CH232367, and to methods for producing a corn plant produced by crossing a corn plant of variety CH232367 with itself or with another corn plant, such as a plant of another variety. The invention further relates to genetic complements of plants of variety CH232367. | 2012-05-17 |
20120124692 | CAMELINA SATIVA VARIETY 'SO-40' - The invention relates to a | 2012-05-17 |
20120124693 | CAMELINA SATIVA VARIETY 'SO-50' - The invention relates to a | 2012-05-17 |
20120124694 | CAMELINA SATIVA VARIETY 'SO-60' - The invention relates to a | 2012-05-17 |
20120124695 | RESISTANCE TO NASONOVIA RIBISNIGRI BIOTYPE 1 (NR:1) FROM LACTUCA SERRIOLA - The present invention relates to lettuce ( | 2012-05-17 |
20120124696 | METHOD OF GENE INTRODUCTION INTO TRITICUM PLANT USING AGROBACTERIUM, AND A METHOD OF PRODUCING TRANSFORMED TRITICUM PLANT - The method of the present invention includes the step of excising one or more portions selected from a radicle, a germ, and an embryonic axis of a plant tissue inoculated with | 2012-05-17 |
20120124697 | PLANTS WITH ALTERED ROOT ARCHITECTURE, RELATED CONSTRUCTS AND METHODS INVOLVING GENES ENCODING NUCLEOSIDE DIPHOSPHATASE KINASE (NDK) POLYPEPTIDES AND HOMOLOGS THEREOF - Isolated polynucleotides and polypeptides and recombinant DNA constructs particularly useful for altering root structure of plants, compositions (such as plants or seeds) comprising these recombinant DNA constructs, and methods utilizing these recombinant DNA constructs. The recombinant DNA construct comprises a polynucleotide operably linked to a promoter functional in a plant, wherein said polynucleotide encodes a polypeptide useful for altering plant root architecture. | 2012-05-17 |
20120124698 | HERBICIDE-TOLERANT PLANTS THROUGH BYPASSING METABOLIC PATHWAY - The invention concerns a novel method for making herbicide-tolerant plants, in particular to HPPD inhibiting herbicides, the nucleic acid sequences coding for enzymes capable of being used in said method, expression cassettes containing them and transgenic plants comprising at least one of said expression cassettes. | 2012-05-17 |
20120124699 | Plant Defense Genes and Proteins and Methods of Use - Methods and compositions for modulating development and defense responses are provided. Nucleotide sequences encoding plant defense proteins are provided. The sequences can be used in expression cassettes for modulating development, developmental pathways, and defense responses. Transformed plants, plant cells, tissues, and seed are also provided. | 2012-05-17 |
20120124700 | Maize Ethylene Signaling Genes and Modulation of Same for Improved Stress Tolerance in Plants - The invention provides isolated maize EIN3, ERF3, EBF1, EBF2, EIN5 nucleic acids which are associated with ethylene signaling in plants and their encoded proteins. The present invention provides methods and compositions relating to altering ethylene sensitivity in plants. The invention further provides recombinant expression cassettes, host cells, transgenic plants and antibody compositions. | 2012-05-17 |
20120124701 | PROMOTER, PROMOTER CONTROL ELEMENTS, AND COMBINATIONS, AND USE THEREOF - The present invention is directed to promoter sequences and promoter control elements, polynucleotide constructs comprising the promoters and control elements, and methods of identifying the promoters, control elements, or fragments thereof. The invention further relates to the use of the present promoters or promoter control elements to modulate transcript levels in plants, and plants containing such promoters or promoter control elements. | 2012-05-17 |
20120124702 | Plants Having Enhanced Yield-Related Traits And A Method For Making The Same - The present invention relates generally to the field of molecular biology and concerns a method for enhancing yield-related traits in plants, in particular for increasing plant yield and/or early vigour, relative to control plants. More specifically, the present invention concerns a method for enhancing yield-related traits comprising modifying the expression of a nucleic acid encoding a HAL3 polypeptide, MADS15 polypeptide, PLT transcription factor polypeptide, basic/helix-loop-helix (bHLH) transcription factor, or SPL15 transcription factor. The invention also provides constructs useful in the methods of the invention. | 2012-05-17 |
20120124703 | NOVEL COPRINUS COMATUS AND TREMELLA MESENTERICA MUSHROOM STRAINS, PRODUCTS AND EXTRACTS THEREOF AND COMPOSITIONS COMPRISING THEM - New and distinct varieties of higher Basidiomycetes mushrooms selected from | 2012-05-17 |
20120124704 | INFUSION OF CANNABIS - One example embodiment includes a method for infusing Cannabis. The method includes preparing the Cannabis. The method also includes placing the Cannabis in an infusible liquid. The infusible liquid is suitable for human consumption and configured to remove one or more chemical compounds from the infusible liquid. | 2012-05-17 |
20120124705 | NOVEL FATTY ACID DESATURASES AND ELONGASES AND USES THEREOF - The invention provides isolated nucleic acid molecules which encode novel fatty acid desaturases and elongases from the organism | 2012-05-17 |
20120124706 | SCANNING PROBE MICROSCOPE AND METHOD FOR DETECTING PROXIMITY OF PROBES THEREOF - A scanning probe microscope includes: a first and second probes for scanning a sample while maintaining the distance to the sample surface; crystal oscillators holding each of the first and second probes; and a modulation oscillator for providing the first probe with a vibration of a specific frequency which is different from the resonant frequency of each crystal oscillator. A control unit monitors the vibration of the specific frequency of the first and second probes, detects proximity of the first probe and the second probe to each other based on the change of the specific frequencies, and controls the drive of the first and second probes. | 2012-05-17 |
20120124707 | Apple tree rootstock named 'G.214' - A new and distinct variety of apple tree rootstock | 2012-05-17 |
20120124708 | Helleborus plant named 'VERBEAUTY2' - A new and distinct | 2012-05-17 |
20120124709 | PENSTEMON PLANT NAMED RED HEADED BEAUTY - A new and distinct | 2012-05-17 |
20120124710 | TIARELLA PLANT NAMED 'OREGON TRAIL' - A new and distinct cultivar of | 2012-05-17 |