25th week of 2009 patent applcation highlights part 70 |
Patent application number | Title | Published |
20090158394 | SUPER PEER BASED PEER-TO-PEER NETWORK SYSTEM AND PEER AUTHENTICATION METHOD THEREOF - Provided are a super peer based P2P network system and a peer authentication method thereof. The authentication method includes a first authentication process and a second authentication process. In the first authentication process, a user and a peer which want to use a P2P network are verified by submitting authentication information and a public key infrastructure (PKI) certificate, and receive the permission of connection. In the second authentication process, a user and a peer requesting the use of a specific service are authenticated by using an authentication ticket and a service access-permitted time is limited in order to reinforcing the security of the specific service, which is searched in the P2P network and provided by the peer. Accordingly, the service providers can verify users more securely and limit the service available time of each user with respect to a specific service provided by the peer by using the lifetime of the ticket. | 2009-06-18 |
20090158395 | METHOD AND APPARATUS FOR DETECTING DOWNLOADABLE CONDITIONAL ACCESS SYSTEM HOST WITH DUPLICATED SECURE MICRO - A method where a Downloadable Conditional Access System Provisioning Server (DPS) detects a duplicated secure micro is provided. A method of detecting a duplicated secure micro, the method including: generating authentication time difference information associated with a value of a difference between a time when a host is finally authenticated in a first address and a time when the host is authenticated in a second address; comparing the authentication time difference information with a first reference value and a second reference value, the second reference value being less than the first reference value; and determining whether the secure micro is duplicated based on a result of the comparing. | 2009-06-18 |
20090158396 | Secure Home-to-Vehicle Wireless Connectivity - A method for providing a secure communications link between a home PC and a vehicle through a wireless access point. The method includes providing a wireless connection between a vehicle communications system and the wireless access point and causing a user of the PC to initiate a communication with the vehicle communications system through the wireless access point so as to allow the user to send information to the vehicle from the home PC. The method also includes causing the vehicle communications system to send an authentication challenge to the PC, such as identifying a user name and password, to authorize the user to communicate with the vehicle communications system, and establishing a secure communications link between the vehicle communications system and the PC if the user responds to the challenge with a correct response. | 2009-06-18 |
20090158397 | Secure Push and Status Communication between Client and Server - Systems and methods of authentication and authorization between a client, a server, and a gateway to facilitate communicating a message between a client and a server through a gateway. The client has a trusted relationship with each of the gateway and the server. A method includes registering the client with the gateway. The client also constructs the address space identifying the gateway and the client. The client communicates the address space to the server. The client receives an identity identifying the server. If the client authorizes to receive a message from the server through the gateway, the client informs the authorization to the gateway. The client puts the identity identifying the server on a list of servers which are authorized to send messages to the client. In addition, the client communicates the list of servers to the gateway. | 2009-06-18 |
20090158398 | ENABLING PROVIDER NETWORK INTER-WORKING WITH MOBILE ACCESS - Various example embodiments are disclosed herein. In an example embodiment, a method may comprise authenticating a subscriber based upon one or more messages received from a subscriber equipment, via an Access Network Gateway (ANG); sending an access authorization message to the ANG authorizing the subscriber equipment; and wherein the access authorization message includes an address of a tunnel endpoint node and a tunnel method identifier (ID) to be used by the ANG to establish a tunnel between the ANG and the tunnel endpoint node for the subscriber equipment. | 2009-06-18 |
20090158399 | Method and apparatus for processing a multi-step authentication sequence - A method of automating an authentication sequence for accessing a computer resource comprising processing form information associated with the authentication sequence, wherein the authentication sequence comprises a plurality of queries associated with a plurality of web pages; and communicating a response to a portion of the authentication sequence using form information that corresponds to a query upon recognition of indicia of the portion of the plurality of web pages where the portion comprises the query. | 2009-06-18 |
20090158400 | WIRELESS COMMUNICATION TERMINAL, METHOD FOR PROTECTING DATA IN WIRELESS COMMUNICATION TERMINAL, PROGRAM FOR HAVING WIRELESS COMMUNICATION TERMINAL PROTECT DATA, AND RECORDING MEDIUM STORING THE PROGRAM - Security of a file or an application program saved in a wireless communication terminal is maintained. A process performed by the wireless communication terminal includes the steps of: detecting an access point for wireless LAN (Local Area Network) based on a signal sent from a wireless communication I/F; obtaining an SSID (and a MAC address) of the detected access point; referring to access management data stored in a hard disk based on the obtained SSID; and restricting access to the file or the program based on the access management data. | 2009-06-18 |
20090158401 | DOWNLOADABLE CONDITIONAL ACCESS SYSTEM AND CONTROLLING METHOD FOR THE SAME - A method and apparatus of supporting a fee-based broadcasting service in a Downloadable Conditional Access System (DCAS) is provided. A control method of a DCAS, the method including: receiving a Conditional Access (CA) image file from a Conditional Access System (CAS) server and receiving Integrated Personalization Server (IPS) access information from an IPS; providing an Authentication Proxy (AP) with information about the received CA image file; controlling the AP to provide a terminal with access information to the IPS and image installation information when the terminal joins a fee-based service based on verifying device information of the terminal; and controlling the IPS to enable the terminal to receive a CA image code of the terminal based on the access information and the image installation information. | 2009-06-18 |
20090158402 | SYSTEM AND METHOD FOR AUTHORIZING ACCESS REQUEST FOR HOME NETWORK - A system and method for authorizing an access request for a home network. The system includes at least one accessed device, at least one authorizing device and at least one authorizing proxy server, wherein a connection request managing module is provided in the accessed device, the authorizing proxy server includes an access request information forwarding module, an authorizing information forwarding module and an authorizing mode managing module. The method includes the authorizing proxy server receives an access request information of an accessing device that is acquired and transmitted by the accessed device; the authorizing proxy server forwards the received access request information to the authorizing device; after receiving the authorized information of the authorizing device, the authorizing proxy server feedbacks the authorized information to the accessed device; the authorized information is the information that is sent to the authorizing proxy server after the authorizing device determines the authorization according to the received access request information. | 2009-06-18 |
20090158403 | METHOD AND SYSTEM FOR PERMITTING OR DENYING SERVICE - Aspects of the invention relate to a computer-implemented method and system of permitting or denying service for a user device of a user of a service in relation to a recipient, who is the counterparty, is proposed. The method is executed in a system configured for connecting to the user device. The system is configured for accessing a recipient requirement list of the recipient and a user profile of the user. The recipient requirement list comprises at least one criterion regarding an item of said user profile. A service request is received from the user device. The service request contains an identifier of the recipient. The recipient requirement list is traced on the basis of this identifier. Subsequently, it is checked whether an item of the user profile satisfies the at least one criterion of the traced recipient requirement list. Service is permitted if the item of the user profile satisfies said at least one criterion of said recipient requirement list. Service initiation or service establishment is denied if said item of said user profile does not satisfy said at least one criterion of said recipient requirement list. | 2009-06-18 |
20090158404 | APPARATUS, SYSTEM, AND METHOD FOR USER AUTHENTICATION BASED ON AUTHENTICATION CREDENTIALS AND LOCATION INFORMATION - A computer program product, apparatus, and system, are disclosed for user authentication based on authentication credentials and location information. A computer program product performs operations for such authentication. These operations of the computer program product include referencing past user location information in response to an authentication validation request and referencing current user location information. These operations also include determining a maximum allowable distance between an authentication attempt location associated with the authentication attempt location identifier and a past location associated with the past user interaction location identifier, and managing the authentication attempt, in response to determining that the physical authentication attempt location is outside the maximum allowable distance. The computer program product, apparatus, and system thereby reduce the possibility of identity theft by adding an element of location awareness to the authentication process. | 2009-06-18 |
20090158405 | SYSTEM AND METHODS FOR CREDENTIALING ON-LINE INFORMATION PROVIDERS - A method of credentialing network-based sources of information, commentary, and opinion is provided. The method includes receiving a request for recognition, the request received by a credential clearinghouse (CCH) from at least one credential-granting organization (CGO), and, in response to the request for recognition, granting recognition to the CGO if the CGO is determined by the CCH to satisfy a predetermined standard of credibility. The method further includes, after the CGO is granted recognition, receiving from a user entity a request for a credential granted by the CGO, and granting the credential if the user entity is determined to satisfy a predetermined set of credentialing benchmarks. Additionally, the method includes posting on a publicly-accessible data communications network site an object comprising at least one among information content, commentary, and opinion, the object being associated with the user entity and including an indicator indicating the grant of the credential. | 2009-06-18 |
20090158406 | PASSWORD RESET SYSTEM - A customer initiated password reset system resets user passwords on a variety of network entities, such as internal systems, allowing simultaneous reset with a minimum number of user specified passwords that nonetheless satisfy the password specifications of these internal systems. Thereby, the user avoids the tedium of logging into each of these systems, changing their password, logging out, etc., for each system with the likelihood of creating unique passwords for each system that have to be remembered. By further incorporating a score metric based upon how many character sets are touched, a required degree of complexity can be measured and enforced against the password specifications. Advantageously, a table-based approach to enforcing password reset against the multiple password specifications facilitates making and fielding updates. | 2009-06-18 |
20090158407 | API TRANSLATION FOR NETWORK ACCESS CONTROL (NAC) AGENT - An application programming interface (API) translation agent and method for converting a message from one application configured according to a first API to a message configured according to a second API so that the first application, which is configured to communicate only in accordance with the first API, can communicate with a second application, which is configured to communicate only in accordance with the second API. The first and second applications can include a security application and a network access control (NAC) agent installed on an end point computing device, and the API translation agent can be used by the NAC agent to obtain information regarding a security status of the end point computing device, the information being used to determine whether the end point computing device is in compliance with the security policies of a network. | 2009-06-18 |
20090158408 | METHODS, SYSTEMS, AND COMPUTER PRODUCTS FOR PROVIDING AND ACCESSING MEDIA - Methods, systems, and computer products for providing media over an Internet Protocol (IP) based network. The methods, systems, and computer products include receiving a handle and/or password input by a user, associating the handle and/or password to a channel inaccessible by the public, mapping the handle and/or password input by the user to the inaccessible channel, and providing the inaccessible channel to the user. | 2009-06-18 |
20090158409 | REMOTE CONFIGURATION, PROVISIONING AND/OR UPDATING IN A LAYER TWO AUTHENTICATION NETWORK - A device capable of remote configuration, provisioning and/or updating comprising a network detector capable of detecting a network regardless of the state of the operating system on the device, wherein the network requires layer two authentication, and an Embedded Trust Agent capable of generating an authentication credential for layer two authentication and communicating the authentication credential via a layer two authentication protocol without a functioning operating system. | 2009-06-18 |
20090158410 | NETWORK SYSTEM, ITS CONTROL METHOD, AND PROGRAM - The invention provides a network system which can prevent an illegal access to a network or the like set in a specific area and improve security of the network. The network system permits the entering of the user into a security area in accordance with security information (user ID) read out of a contactless IC in a carrying ID card by an entering/leaving room managing apparatus and registers an MAC address of a notebook computer carried by the user when he enters the security area to a managing server as ID information corresponding to the user ID. When a leaving request of the user is received through the entering/leaving room managing apparatus, the network system deletes the registered ID information and restricts connection between the notebook computer and the network on the basis of a registration situation of the ID information to the managing server. | 2009-06-18 |
20090158411 | Method and system for enabling remote access to a computer system - Method and systems configured for allowing a non-local remote user to access a computer system with a particular authorization level. Such access is facilitated by examining non-local directory services group memberships of the user and performing a mapping of the user's identity to a corresponding universal local user account that have the proper authorization level or levels. Such methods and systems allow any number of non-local remote users access to the computer system in such a way that the remote user assumes the identity of (i.e., is mapped to) a corresponding universal local user account of an appropriate privilege level. All non-local remote users that the computer system determines to be of the same privilege level will share the identity of the same universal local user account. | 2009-06-18 |
20090158412 | Secure Automatically Configuring, Self-Authenticating Administrative User Without A Password - A method and apparatus are provided for accessing a server of a computer system. The method includes the steps of providing a startup CONFIG file or database table for use during initialization of the server and a predetermined user identifier within the startup CONFIG file or database table. The method further includes the steps of a user requesting access to the server, the user providing the predetermined user identifier and the server logging the user into the server under the predetermined user identifier without requiring a password. | 2009-06-18 |
20090158413 | METHOD AND APPARATUS FOR SECURE AND SMALL CREDITS FOR VERIFIABLE SERVICE PROVIDER METERING - A method and apparatus for obtaining access to services of service providers. In one embodiment, the method comprises requesting a desired service through a foreign service provider, generating a hash tree and generating a digital signature on a root value of the hash tree, sending the digital signature and the root value to the foreign service provider, providing one or more tokens to the foreign service provider with the next packet if the foreign service provider accepts the signature and continuing to use the service while the foreign service provider accepts tokens. | 2009-06-18 |
20090158414 | METHOD AND APPARATUS FOR MUTUALLY AUTHENTICATING A USER DEVICE OF A PRIMARY SERVICE PROVIDER - A system and method for communicating between a secondary content provider and a user device includes a primary service provider having an authentication server of a primary service provider authenticating the user device. The primary service provider provides primary content to the user device. The system also includes a supplemental service provider. The authentication server authenticates the service provider. The user device and the supplemental service provider mutually authenticate each other. Thereafter, the supplemental service provider communicates supplemental content to the user device. | 2009-06-18 |
20090158415 | METHOD AND APPARATUS OF PROVIDING AN INTERFACE FOR MANAGING NETWORK SWITCHES - An approach is provided for presenting, via a graphical user interface, a plurality of selectable areas corresponding to a plurality of categories of switches and a plurality of options. One of the options includes a search function for finding a desired one of the switches. A communication session is automatically established with one of the switches as specified by a user through one of the selectable areas or the search function. Information from the one switch is received over the communication session, wherein the information is used for analyzing the one switch. | 2009-06-18 |
20090158416 | Proxy with Layer 3 Security - A proxy system may use Layer 3 security mechanisms to establish secure communications between two devices. Each device may establish a secure session with the proxy using the same or a different configuration of a secure session. The proxy may pass traffic between the two devices and perform translation of the traffic between the two secure sessions. The proxy may also perform application layer gateway translations for communication traffic. Some embodiments may comprise a distribution or master proxy that may assign a communication session to a slave proxy in a scalable architecture. | 2009-06-18 |
20090158417 | Anti-replay protection with quality of services (QoS) queues - An embodiment of the present invention includes a technique to provide anti-replay protection with QoS queues. A single global anti-replay window is maintained to have global lowest and highest sequence numbers for an Internet protocol security (IPSec) security association (SA). The single global anti-replay window is associated with individual differentiated services code point (DSCP) or DSCP group, the individual DSCP or DSCP group corresponding to individual per-DSCP anti-replay windows. A received packet having a sequence number is pre-processed before packet processing using the single global anti-replay window. The received packet is post-processed after packet processing using the individual per-DSCP anti-replay windows. | 2009-06-18 |
20090158418 | SYSTEMS AND METHODS FOR PROVIDING A VPN SOLUTION - A system, apparatus and a method for implementing a secured communications link at a layer other than that at which packets are filtered are disclosed. In one embodiment, a computer system is configured to form a virtual private network (“VPN”) and comprises an address inspection driver to identify initial target packet traffic addressed to a target server. Also, the computer system includes a pseudo server module to receive rerouted initial target packet traffic from the address inspection driver. The pseudo server module is configured to convey packet regeneration instructions to a VPN gateway. The address inspection driver functions to identify additional target packet traffic addressed to the target server and routes the additional target packet traffic to the pseudo server. In one embodiment, the pseudo server is configured to strip header information from the additional target packet traffic to form a payload, and thereafter, to route the payload to the target. | 2009-06-18 |
20090158419 | METHOD AND SYSTEM FOR PROTECTING A COMPUTER SYSTEM DURING BOOT OPERATION - A method for protecting a computer system from malicious network traffic is provided using a driver which inspects network packets. A security profile comprising packet inspection rules is compiled and stored on the computer system. During the startup or boot operation of an operating system, the driver loads the compiled security profile and inspects network packets using the inspection rules. | 2009-06-18 |
20090158420 | SELECTIVE DESKTOP CONTROL OF VIRTUAL PRIVATE NETWORKS (VPN'S) IN A MULTIUSER ENVIRONMENT - Techniques for selective desktop control of virtual private networks (VPN's) in a multiuser environment are provided. A multiuser desktop/workstation includes a first user that establishes a VPN session on the desktop for accessing protected resources. Other users are permitted to simultaneously access non-protected resources of the desktop during the VPN session. Other users are also permitted to log into the desktop during the VPN session. However, if the other users attempt to access the protected resources, the access attempts are denied. | 2009-06-18 |
20090158421 | Security Analysis Method - A computer system comprising a receiving means for receiving an input of at least one user parameter a storage means for storing at least one template; a matching means for matching the at least one user parameter to a template; a locking means for locking the at least one user parameter to the matched template; and a providing means for providing an output of a user identification according to the matched template. | 2009-06-18 |
20090158422 | Image Forming Device and Image Forming Program - The present invention is an image forming device capable of executing an authentication print printing. The image forming device includes: an authentication print detecting unit which detects whether to execute a job as the authentication print printing by referencing predetermined data; an authentication unit; a user authentication unit which outputs the result of the user authentication; a job executing unit; a user interface; and a user interface input mode switching unit which switches an information input/output mode of the user interface, wherein, an instruction to execute a first process can be received, and wherein the first process includes processes in which: the execution of the authentication print printing starts based on the result of the user authentication output by the user authentication unit; and the result of the user authentication is invoked so that the information input/output mode of the user interface is switched to a login mode. | 2009-06-18 |
20090158423 | LOCKING MOBILE DEVICE CRADLE - Systems, devices and/or methods that facilitate an improved locking system are presented. An improved locking system can employ biometric sensing to facilitate improved mobile device security, more specificity in user access, specificity in levels of access, user accountability, selection of available devices, or combinations thereof, among many others. An improved locking system can employ remote oversight, multiple layers of locking, and inferential determinations to further facilitate a more transparent, effective, and substantial locking system for mobile devices. The improved locking system can be employed in devices, cradles, docking stations, and/or aftermarket products, and the like, among many others. | 2009-06-18 |
20090158424 | METHOD OF INPUTTING PASSWORD - The present invention discloses a method of inputting a password, and a background pattern is provided for helping a user to remember a password position and prevent the password from being stolen by others. The method of inputting a password sets a number of password characters on the background pattern, so that the user can remember at least one password position from the background pattern, and input a password character shown at the password position into a system. Therefore, the method can use the background pattern to help the user to remember the password position and prevent the password from being stolen by others. | 2009-06-18 |
20090158425 | USER DEFINABLE POLICY FOR GRADUATED AUTHENTICATION BASED ON THE PARTIAL ORDERINGS OF PRINCIPALS - Apparatus, methods, and computer program products are disclosed that determine an actor context of an actor as well as an access environment for an attempted operation responsive to the actor context and a necessary condition. The method also evaluates whether the access environment satisfies the necessary condition and activates a principal responsive to the evaluation and authenticates the actor against the principal. | 2009-06-18 |
20090158426 | TRACEBACK METHOD AND SIGNAL RECEIVING APPARATUS - The present invention provides a traceback method including: receiving data including router information according to a path of an attacker; filtering the data to hash the data, and storing the resultant hashed information; determining whether the data is normally received on the basis of the hashed information; and predicting a path loss on the basis of the determination result. Therefore, it is possible to perform an accurate IP traceback using a probabilistic packing marking method and a hash-based traceback method. | 2009-06-18 |
20090158427 | SIGNATURE STRING STORAGE MEMORY OPTIMIZING METHOD, SIGNATURE STRING PATTERN MATCHING METHOD, AND SIGNATURE STRING MATCHING ENGINE - Enclosed are a signature string storage memory optimizing method, a signature string pattern matching method, and a signature matching engine. Signature is tokenized in units of substrings and the tokenized substrings are stored in an internal memory block and an external memory block to optimize a memory storage pattern. Therefore, matching of introduction data to signature patterns is effectively performed. | 2009-06-18 |
20090158428 | Method and Device for Integrating Multiple Threat Security Services - A method and device for integrating multiple threat security services are disclosed. The method may comprise parsing an incoming packet at a current layer and analyzing the packet with respect to multiple threat security services and so that one or more threat security services needed by the packet may be determined. According to an exemplary embodiment, the current layer may be a layer in a protocol stack constructed based on the multiple threat security services. With this method, integrated multiple threat security services may filter application data and parse network packet data via a single integrated entity, and thus the efficacy of filtering application data may be improved while computation overhead may be reduced. | 2009-06-18 |
20090158429 | METHODS AND SYSTEMS FOR ENABLING ANALYSIS OF COMMUNICATION CONTENT WHILE PRESERVING CONFIDENTIALITY - Disclosed are methods and systems for enabling analysis of communication content while preserving confidentiality. In one embodiment, communication content is processed to increase the similarity of superficially dissimilar instances of communication content and/or to increase the distinctiveness of superficially similar instances of communications content. In this embodiment at least part of the processed communication content is hashed to obscure the actual communication content. In one embodiment, social network analysis is performed on the communication content after hashing, and visualization of the social network analysis includes thread graphs and/or circular graphs. | 2009-06-18 |
20090158430 | Method, system and computer program product for detecting at least one of security threats and undesirable computer files - Method, system and computer program product for detecting at least one of security threats and undesirable computer files are provided. A first method includes receiving a data stream which represents outbound, application layer messages from a first computer process to at least one second computer process. The computer processes are implemented on one or more computers. The method further includes monitoring the data stream to detect a security threat based on a whitelist having entries which contain metadata. The whitelist describes legitimate application layer messages based on a set of heuristics. The method still further includes generating a signal if a security threat is detected. A second method includes comparing a set of computer files with a whitelist which characterizes all legitimate computer files. The whitelist contains one or more entries. Each of the entries describe a plurality of legitimate computer files. | 2009-06-18 |
20090158431 | METHOD OF DETECTING POLYMORPHIC SHELL CODE - There is provided a method of detecting a polymorphic shell code. The decoding routine of the polymorphic shell code is detected from received data. In order for the decoding routine to access the address of an encoded code, the address of a currently executed code is stored in a stack, the value is moved in a register table, and it is determined whether the value is actually used for operating a memory. Emulation is finally performed and the degree of correctness of detection is improved. Therefore, time spent on detecting the polymorphic shell code and an overhead are reduced and the correctness of detection is increased. | 2009-06-18 |
20090158432 | On-Access Anti-Virus Mechanism for Virtual Machine Architecture - A tangible medium embodying instructions usable by a computer system to protect a plurality of guest virtual machines (VMs), which execute via virtualization software on a common host platform, from malicious code is described. A scan engine is configured to scan data for malicious code and determine a result of the scanning, wherein the result indicates whether malicious code is present in the data. A driver portion is configured for installation in an operating system of a target VM, which is one of the guest VMs. The driver portion intercepts an access request to a file, that originates within the target VM. The driver portion communicates information identifying a location of the data to be scanned by the scan engine without sending a copy of the data to the scan engine. The scan engine executes within the virtualization layer outside a context of the target VM. | 2009-06-18 |
20090158433 | Method and Apparatus to Facilitate Generating Worm-Detection Signatures Using Data Packet Field Lengths - Network-level data traffic comprising data packets, wherein at least some of the data packets have at least one field of unbounded length, are received ( | 2009-06-18 |
20090158434 | Method of detecting virus infection of file - Provided is a method of detecting virus infection of a file. The method includes the steps of a) copying an original file, and converting and simplifying data of the copied file; b) normalizing the simplified file data; c) acquiring distribution of similarity between data using the normalized file data; and d) analyzing the acquired distribution of similarity between data, and determining that the file is virus-infected when a preset dense distribution pattern exists. Thus, the method can effectively determine whether or not the file is infected with a virus without using a database (DB) of spam filtering or virus information. | 2009-06-18 |
20090158435 | HASH-BASED SYSTEMS AND METHODS FOR DETECTING, PREVENTING, AND TRACING NETWORK WORMS AND VIRUSES | 2009-06-18 |
20090158436 | Method for Exporting Use Rights for Electronic Data Objects - There currently exists a plurality of digital rights management (DRM) systems on the market, each with its own rights expression language. As a result, when an electronic data object is exported from one DRM system to another DRM system, translation errors are generated, which can cause the irretrievable loss of individual rights granted by the copyright holder. To export rights to use electronic data objects and ensure interoperability between different DRM systems, the original rights to use that can be associated with the electronic data object are exported from data source to the data sink. In this way, the original license is advantageously kept when the rights to use are exported from one DRM system to another DRM system. | 2009-06-18 |
20090158437 | METHOD AND SYSTEM FOR DIGITAL RIGHTS MANAGEMENT AMONG APPARATUSES - A digital rights management (DRM) method and system between devices are disclosed. In order to allow a first device connected with a second device to use a rights object (RO) bound to the second device, the second device decodes the particular content or the RO and transmits the decoded particular content or the decoded RO to the first device. State information of the RO according to a usage amount of the particular content used by the first device is managed by the second device. | 2009-06-18 |
20090158438 | SOFTWARE LICENSE RECONCILIATION FACILITY - A method is presented for monitoring software product usage in a data processing system. The method may include installing an instance of a software product on a target entity of a data processing system. A usage condition applicable to the instance may be identified. Reconciliation information may be generated upon installation of the instance. This reconciliation information may correlate the usage condition with the instance to facilitate later determining compliance of the software product with applicable usage conditions. | 2009-06-18 |
20090158439 | METHOD FOR PROTECTING UNPROTECTED CONTENT IN DRM AND DEVICE THEREOF - A method for protecting unprotected content in digital rights management (DRM) and a device thereof. When non-protected content stored in a non-DRM device is to be transferred to a DRM device, the non-protected content are converted into protected content and then are transferred to other user's device. | 2009-06-18 |
20090158440 | SYSTEM AND METHOD FOR EXPORTING LICENSE - A method for exporting permission is provided to solves the problem that the permission can not be exported multiple times among several DRM systems in the prior art; the method includes that: determining that a license is permitted to be exported to a system that a target device belongs to; determining whether an export permission in the license is permitted to be exported; and exporting the export permission in the license to the target device if the export permission in the license is permitted to be exported, which enables the target device to export the license to another device. A terminal apparatus, a server and a communication network are also disclosed. | 2009-06-18 |
20090158441 | SENSITIVE INFORMATION MANAGEMENT - Information is identified as sensitive and a lapsed time job (Chron Job) is created that will allow the deletion of sensitive information after a period of time. The interval could be set to be longer than vacation or other planned use, and yet short enough to limit the period where risk to the organization or individual is incurred. The Chron Job could be integrated with the user's calendar, such that the Chron Job considers holiday time as a means of delaying execution of the Chron Job which would allow a shorter interval to be selected. In addition to deletion of the information identified as sensitive, additional steps could also be taken, such as the purging of the recycle bin, modification of the FAT, and optionally the deletion of related information. Once information is identified as sensitive, the information and derivative works are tracked and managed. | 2009-06-18 |
20090158442 | Method of User Access Authorization in Wireless Local Area Network - The present invention discloses a method of user access authorization in wireless local area networks. The method comprises: when a Wireless Local Area Network (WLAN) user terminal is accessing a WLAN operational network, the WLAN operational network, while authenticating this WLAN user terminal, judging whether to allow this WLAN user terminal to access according to authorization conditions having an impact on the access of this WLAN user terminal, if yes, the WLAN operational network will determine the access rules of this WLAN user terminal according to the said authorization conditions; otherwise, the WLAN operational network will notify the WLAN user terminal about the failure. Different users can be controlled to access the network according to different authorization conditions, and be restricted by different access rules after getting accessed. Thus, the access control capability of a wireless local area network is enhanced and the working efficiency of the network is improved. | 2009-06-18 |
20090158443 | PIRACY PREVENTION, DETECTION, AND CONTENT MANAGEMENT - A computing device is configured to receive media content and determine if the received media content includes a stego message. If the media content includes a stego message, then the computing device is further configured to decode at least a portion of the stego message, and perform a task based in part on the decoded portion of the stego message. | 2009-06-18 |
20090158444 | System and Method for Controlling Access to Addressable Integrated Circuits - A circuitry access system for controlling access to addressable circuit elements of an integrated circuit. The circuitry access system includes a first storage element having a first listing of unique identifiers each identifier representing one of the addressable circuit elements. A selector distinguishes a first subset of unique identifiers from the first listing. A second storage element receives and stores the first subset in an arrangement that does not include an indication of the absence of any unique identifier of the first listing that is not included in the first subset. An output of second storage element allows a user of the integrated circuit to access one or more of the addressable circuit elements corresponding to the first subset of unique identifiers. A method of controlling access to addressable circuit elements is also provided. | 2009-06-18 |
20090158445 | Security Circuit for Power Up - A circuit and method for securing against non-reset of a device associated with the circuit, the circuit comprising: a first register for holding a first multi-bit value and to produce a first multi-bit output value related to the first multi-bit value; a second register for holding a second multi-bit value and to produce a second multi-bit output value related to the second multi-bit value; an inverter means arranged to invert only one of the first and second output values; and a comparator arranged to compare the inverted and non-inverted output values to produce a comparator output, wherein the first and second registers are arranged such that they are subject to substantially the same operational conditions. | 2009-06-18 |
20090158446 | USB stacking devices and applications - A modular device formed with USB connectors. The USB can be used for connecting different kinds of devices, for example memories, user interfaces and the like. The USB devices can be piggybacked. In an embodiment, the USB devices can be located in a cavity formed inside the computer. Another embodiment forms a modular cellular telephone. | 2009-06-18 |
20090158447 | TLR ligand and IL-1 Response-Injured Animal Model - The present invention provides a TLR ligand/IL-1 response-impaired non-human animal model wherein IL-6 production responding to a TLR ligand/IL-1 is impaired, a method for screening a substance promoting or suppressing a response to a TLR ligand/IL-1 by using the TLR ligand/IL-1 response-impaired non-human animal model, and a method for screening a prophylactic/therapeutic agent for atopic dermatitis-like inflammatory skin disease. A non-human animal model unresponsive to a TLR ligand/IL-1 is generated wherein whole or a part of an endogenous gene of the non-human animal encoding IκB-ζ is inactivated by a gene mutation such as destruction, deletion, or substitution, a function of expressing IκB-ζ is deleted, and a IL-6 production responding to a TLR ligand and IL-1 is impaired. Moreover, the promoter or suppressor for a TLR ligand/IL-1 response and the prophylactic/therapeutic agent for atopic dermatitis-like inflammatory skin disease are screened by using the non-human animal and a test substance. | 2009-06-18 |
20090158448 | DNA ENCODING POLYPEPTIDE CAPABLE OF MODULATING MUSCLE-SPECIFIC TYROSINE KINASE ACTIVITY - Disclosed are DNA encoding a polypeptide which can modulate the activity of a muscle-specific tyrosine kinase, and others. The DNA is selected from the following members (a) to (d): (a) DNA comprising a specific nucleotide sequence; (b) DNA comprising a nucleotide sequence capable of hybridizing with a specific nucleotide sequence under stringent conditions; (c) DNA comprising a nucleotide sequence encoding an amino acid sequence having the substitution, deletion and/or addition of one or several amino acid residues in a specific amino acid sequence; and (d) DNA comprising a nucleotide sequence having 90% or higher homology to a specific nucleotide sequence. | 2009-06-18 |
20090158449 | TRANSGENIC AVIAN WHICH HAS FOREIGN GENE CONTAINING SEQUENCE ENCODING FELINE-DERIVED PROTEIN AND METHOD FOR PRODUCTION THEREOF - The present invention has for its object to provide a transgenic bird with a foreign gene containing a feline-derived protein-encoding sequence as transferred therein, and a method of producing the same. The present invention provides a method of producing a feline-derived protein by using a transgenic bird with a method which comprises infecting an avian embryo with a replication defective retrovirus vector containing a foreign gene by microinjection thereof into the early heart or blood vessel formed in the embryo and allowing the embryo to hatch. | 2009-06-18 |
20090158450 | METHOD FOR THE TRANSFER OF EPISOMAL VECTORS INTO ANIMAL CELLS - The present invention refers to a method for the transfer of DNA sequences or exogenous genes into animal sperm cells by means of the use of episomal vectors. The invention also relates to the use of “Sperm Mediated Gene Transfer” (SMGT) technology for the creation of genetically modified individuals. | 2009-06-18 |
20090158451 | Indoleamine 2,3-Dioxygenase-2 - The nucleotide and amino acid sequences of indoleamine 2,3-dioxygenase-2 (IDO2) and methods of use thereof are provided. | 2009-06-18 |
20090158452 | Transgenic plants with enhanced agronomic traits - This invention provides transgenic plant cells with recombinant DNA for expression of proteins that are useful for imparting enhanced agronomic trait(s) to transgenic crop plants. This invention also provides transgenic plants and progeny seed comprising the transgenic plant cells where the plants are selected for having an enhanced trait selected from the group of traits consisting of enhanced water use efficiency, enhanced cold tolerance, increased yield, enhanced nitrogen use efficiency, enhanced seed protein and enhanced seed oil. Also disclosed are methods for manufacturing transgenic seed and plants with enhanced traits. | 2009-06-18 |
20090158453 | SOYBEAN CULTIVAR SG3870NRR - A soybean cultivar designated SG3870NRR is disclosed. The invention relates to the seeds of soybean cultivar SG3870NRR, to the plants of soybean SG3870NRR, to plant parts of soybean cultivar SG3870NRR and to methods for producing a soybean plant produced by crossing soybean cultivar SG3870NRR with itself or with another soybean variety. The invention also relates to methods for producing a soybean plant containing in its genetic material one or more transgenes and to the transgenic soybean plants and plant parts produced by those methods. This invention also relates to soybean cultivars or breeding cultivars and plant parts derived from soybean variety SG3870NRR, to methods for producing other soybean cultivars, lines or plant parts derived from soybean cultivar SG3870NRR and to the soybean plants, varieties, and their parts derived from use of those methods. The invention further relates to hybrid soybean seeds, plants and plant parts produced by crossing the cultivar SG3870NRR with another soybean cultivar. | 2009-06-18 |
20090158454 | LECITIN-LIKE PROTEIN KINASE STRESS-RELATED POLYPEPTIDES AND METHODS OF USE IN PLANTS - A transgenic plant transformed by a Lectin-like Protein Kinase Stress-Related Polypeptide (LPKSRP) coding nucleic acid, wherein expression of the nucleic acid sequence in the plant results in increased plant growth and/or increased tolerance to an environmental stress as compared to a wild type variety of the plant. Also provided are agricultural products, including seeds, produced by the transgenic plants. Also provided are isolated LPKSRPs, and isolated nucleic acids coding LPKSRPs, and vectors and host cells containing the latter. | 2009-06-18 |
20090158455 | COMPOSITIONS AND METHODS FOR MODULATING LYSINE PRODUCTION - Compositions and methods which modulate LL-diaminopimelate aminotransferase are disclosed. Also provided are compositions and methods for enhancing lysine biosynthesis in a cell. | 2009-06-18 |
20090158456 | Polynucleotides Encoding Phenylpropanoid Pathway Enzymes in Coffee - Polynucleotides and polypeptides involved in the biosynthetic pathway of chlorogenic acids in the coffee plant are disclosed. Also disclosed are methods for using these polynucleotides and polypeptides for the manipulation of flavor, aroma, and other features of coffee beans, as well as for the protection of coffee plants against diseases or oxidative stress. | 2009-06-18 |
20090158457 | SPECIFIC EXPRESSION USING TRANSCRIPTIONAL CONTROL SEQUENCES IN PLANTS - The present invention relates generally to methods and transcriptional control sequences suitable for effecting expression of a nucleotide sequence of interest in a plant. More particularly, the present invention relates to methods and transcriptional control sequences suitable for directing specific or preferential expression of a nucleotide sequence of interest in a plant seed. Of particular interest as a transcriptional control sequence in this invention is the promoter PR602 (SEQ ID NO: 1) found in the 5′-untranslated region of the rice END1-like gene and isolated from a rice panicle library. | 2009-06-18 |
20090158458 | DROUGHT TOLERANT PLANTS AND RELATED CONSTRUCTS AND METHODS INVOLVING GENES ENCODING FERROCHELATASES - Isolated polynucleotides and polypeptides and recombinant DNA constructs useful for conferring drought tolerance, compositions (such as plants or seeds) comprising these recombinant DNA constructs, and methods utilizing these recombinant DNA constructs. The recombinant DNA construct comprises a polynucleotide operably linked to a promoter that is functional in a plant, wherein said polynucleotide encodes a ferrochelatase. | 2009-06-18 |
20090158459 | NOVEL TRANSCRIPTION FACTOR FOR INCREASING KERNEL MASS AND YIELD IN PLANTS (1403) - The present invention provides novel polynucleotides, related polypeptides and all conservatively modified variants of a novel transcription factor which is associated with kernel mass in plants. Methods are disclosed to alter the genetic composition of crop plants, enhance kernel size and to improve yield. The invention also includes vectors, cells, and modified plants. | 2009-06-18 |
20090158460 | Plant Diacylglycerol Acyltransferases - This invention relates to an isolated nucleic acid fragment encoding a diacylglycerol acyltransferase. The invention also relates to the construction of a chimeric gene encoding all or a portion of the diacylglycerol acyltransferase, in sense or antisense orientation, wherein expression of the chimeric gene results in production of altered levels of the diacylglycerol acyltransferase in a transformed host cell. | 2009-06-18 |
20090158461 | Transcription Factor Stress-Related Proteins and Methods of Use in Plants - A transgenic plant transformed by a transcription factor stress-related protein (TFSRP) coding nucleic acid, wherein expression of the nucleic acid sequence in the plant results in increased tolerance to environmental stress as compared to a wild type variety of the plant. Also provided are agricultural products, including seeds, produced by the transgenic plants. Also provided are isolated TFSRP, and isolated nucleic acid coding TFSRP, and vectors and host cells containing the latter. Further provided are methods of producing transgenic plants expressing TFSRP, methods of increasing expression of other genes of interest using the TFSRP, methods of identifying novel TFSRP, and methods of modifying the expression of TFSRP in plants. | 2009-06-18 |
20090158462 | Method for Producing Polyunsaturated C20 and C22 Fatty Acids with at Least Four Double Bonds in Transgenic Plants - The present invention relates to a process for the production of polyunsaturated fatty acids in transgenic plants, by introducing, into the plant, the nucleic acids which code for polypeptides with Δ6-desaturase, Δ6-elongase, a Δ5-desaturase, Δ5-elongase, Δ4-desaturase, Δ12-desaturase and/or ω3-desaturase activity. These desaturases and elongases are advantageously derived from | 2009-06-18 |
20090158463 | ENHANCED ZEIN REDUCTION IN TRANSGENIC CORN SEED - Anti-sense-oriented RNA gene suppression agents in the form of a loop of anti-sense-oriented RNA is produced in cells of transgenic organisms, e.g. plants, by transcription from a recombinant DNA construct that comprises in 5′ to 3′ order a promoter element operably linked to more than one anti-sense-oriented DNA element and one or more complementary DNA elements. | 2009-06-18 |
20090158464 | SOYBEAN PROMOTER LTP4 AND FLOWER-PREFERRED EXPRESSION THEREOF IN TRANSGENIC PLANTS - The promoter of a soybean lipid transfer protein LTP4 and fragments thereof and their use in promoting the expression of one or more heterologous nucleic acid fragments in plants are described. | 2009-06-18 |
20090158465 | TRANSGENIC PLANTS WITH ENHANCED DROUGHT-RESISTANCE AND METHOD FOR PRODUCING THE PLANTS - Mutation of ELO2 is newly demonstrated to result in plants with increased sensitivity to abscisic acid (ABA). | 2009-06-18 |
20090158466 | Plants having increased tolerance to heat stress - The invention relates to methods of producing a desired phenotype in a plant by manipulation of gene expression within the plant. The method relates to means which increase the level of expression of a MYB-subgroup14 polynucleotide or a MYB68 polypeptide. The method also relates to expression of a nucleic acid sequence encoding a MYB-subgroup14 or a MYB68 transcriptional factor. The methods are directed to elevating the levels of a MYB-subgroup14 or a MYB68 expression, wherein a desired phenotype such as reduced flower abortion and increased yield during heat stress is observed. The invention also relates to nucleic acid sequences useful in such methods. | 2009-06-18 |
20090158467 | METHODS AND COMPOSITIONS FOR MODULATING FLOWERING AND MATURITY IN PLANTS - The present invention provides compositions and methods for modulating flowering time in plants. Maize RAP2.7 nucleotide sequences are disclosed which upon overexpression cause later flowering and when inhibited cause earlier flowering. Also disclosed is a DNA sequence which acts as a regulator/enhancer of RAP2.7, termed VGT1. This sequence does not code for any known protein, but acts as either a RNAi element or a regulatory DNA or RNA element that either directly regulates expression of flowering genes such as Rap2.7 or specifically targets expression of other genes which control flowering genes such as Rap2.7. This element this can be used as a sequence-based marker to identify inbred and hybrids which have altered maturity. Methods for expressing these nucleotide sequences in a plant for modifying maturity and flowering in plants are provided as well as expression constructs, vectors, transformed cells and plants. | 2009-06-18 |
20090158468 | Metabolic engineering of lipid metabolism by improving fatty acid binding and transport - CHI like fatty acid binding proteins and genes, recombinant cells and organisms, methods of metabolic pathway engineering to improve lipid production in cells, Crystal structures of CHI like fatty acid binding proteins, methods of engineering CHI like fatty acid binding proteins and systems thereof are provided. | 2009-06-18 |
20090158469 | HERBICIDE-RESISTANCE GENE AND UTILIZATION THEREOF - To provide a novel herbicide-resistance gene and a plant imparted a resistance to herbicides by using this gene, a plant having a resistance to herbicides is constructed by transforming a plant cell by a DNA encoding the following protein (A) or (B) and then regenerating the thus transformed plant cell in a plant. (A) A protein having the amino acid sequence represented by SEQ ID NO:2. (B) A protein having an amino acid sequence of SEQ ID NO:2 including substitution, deletion, insertion or addition of one or plural amino acids and having a herbicide-resistant activity. | 2009-06-18 |
20090158470 | Compositions and methods for the treatment of Pierce's Disease - Chimeric anti-microbial proteins, compositions, and methods for the therapeutic and prophylactic treatment of plant diseases caused by the bacterial pathogen | 2009-06-18 |
20090158471 | Novel Bacillus Thuringiensis Gene with Lepidopteran Activity - The invention provides nucleic acids, and variants and fragments thereof, obtained from strains of | 2009-06-18 |
20090158472 | TRANSFORMANT PLANT - A transformant plant transformed with an expression vector, the expression vector including a nucleotide sequence encoding a first polypeptide which has thermophilic endo-1,4-beta-glucanase activity, so that the polypeptide is capable of being expressed in a host cell of the transformant plant. | 2009-06-18 |
20090158473 | SEED-PREFERRED GENE PROMOTERS FROM THE CASTOR PLANT - A nucleotide sequence comprising a nucleotide sequence having at least about 90% homology to the sequence of SEQ ID NO:9 or SEQ ID NO:10. Nucleotide sequences interest operatively linked to nucleotide sequence having at least about 90% homology to the sequence of SEQ ID NO:9 or SEQ ID NO:10 are disclosed. Vectors, methods of regulating target expression, methods of providing a cells, plants, and seeds comprising the nucleotide sequence are also disclosed. | 2009-06-18 |
20090158474 | Feijoa variety named 'Kaiteri' - A new and distinct variety of | 2009-06-18 |
20090158475 | Feijoa variety named 'Anatoki' | 2009-06-18 |
20090158476 | APRICOT TREE, 'AC1' - A new and distinct variety of apricot tree, denominated varietally as ‘AC1’ is disclosed and which is mature for harvesting and shipment under the ecological conditions prevailing in the San Joaquin Valley of Calif. about Apr. 30 | 2009-06-18 |
20090158477 | Apricot tree, 'SC2' - A new and distinct variety of apricot tree, denominated varietally as ‘SC1’ is disclosed and which is mature for harvesting and shipment under the ecological conditions prevailing in the San Joaquin Valley of California about May 3 | 2009-06-18 |
20090158478 | Apricot tree, 'MC5' - A new and distinct variety of apricot tree denominated varietally as ‘MC5’ is described herein and which produces an attractively colored apricot fruit which is mature for harvesting and shipment approximately May 14-May 22 under the ecological conditions prevailing in the San Joaquin Valley of central California. | 2009-06-18 |
20090158479 | Raspberry plant named 'RADIANCE' - This invention relates to a new and distinct everbearing variety of raspberry plant named ‘RADIANCE’. The new variety is primarily adapted to the growing conditions of the central coast of California and is characterized by the following: medium sized, firm, medium red fruit of conic shape, even color, and excellent flavor. Foliage is flat to strongly convex, medium green; possessing medium to strong rugosity, and mostly 3-foliate. Primocanes have an absent to very weak waxy coat, medium to dense thorn density, and medium to weak anthocyanin coloration. | 2009-06-18 |
20090158480 | Raspberry plant named 'GRANDEUR' - This invention relates to a new and distinct everbearing variety of raspberry plant named ‘GRANDEUR’. The new variety is primarily adapted to the growing conditions of the central coast of California and is characterized by the following: large, firm, light-red fruit of conic shape, even color, and very good flavor. Foliage is slightly concave to slightly convex, medium green; possessing very strong rugosity, and always 3-foliate. Primocanes have an absent to very weak waxy coat, medium thorn density, and medium anthocyanin coloration. | 2009-06-18 |
20090158481 | Plant variety of juniperus chinensis named 'NEDSYELO' - A new plant variety of | 2009-06-18 |
20090158482 | CHRYSANTHEMUM PLANT NAMED 'PETNO ORANGE' | 2009-06-18 |
20090158483 | CHRYSANTHEMUM PLANT NAMED 'SUNNO YELLOW' | 2009-06-18 |
20090158484 | DIASCIA PLANT NAMED 'DIASCOT' | 2009-06-18 |
20090158485 | ECHINACEA PLANT NAMED 'CONEKIM' - A new and distinct highly ornamental | 2009-06-18 |