43rd week of 2009 patent applcation highlights part 57 |
Patent application number | Title | Published |
20090265730 | METHODS AND APPARATUS TO DETECT AN INTERNALLY GENERATED SIGNAL MODE OF A LOCAL MEDIA PLAYBACK DEVICE - Methods and apparatus to detect an internally generated signal mode of a local media playback device are disclosed. A disclosed method comprises tuning a harmonic frequency of a chrominance signal output by a local media playback device, and determining that the local media playback device is in an internally generated signal mode if the measured harmonic frequency exceeds a predetermined threshold. | 2009-10-22 |
20090265731 | EXTENSIBLE DOWNLOADABLE CONTENT ADVISORY SYSTEM - A region rating table includes a number of rating dimensions and a number of rating levels. The rating dimensions may be identified by an index. Also, one or more rating level tags are added to the rating levels. The rating level tags identify each rating level within a rating dimension uniquely. The rating region table may be downloaded to the receiver for the user to set blocking preferences. A content advisory description may be specified. When content is received, it is analyzed to determine if it should be blocked based on the dimension index and the rating level tag. If the content is acceptable, it is not blocked, and if it is not acceptable, then it is blocked. Using the rating level tag to identify a rating level within a dimension allows changes to be made to the region rating table without creating unwanted blocking behavior and viewer confusion. | 2009-10-22 |
20090265732 | CONTENTS PROVIDING SYSTEM, AND CONTENTS PROVIDING METHOD - A contents processing device for displaying contents is enabled to change the display format of a contents displaying display unit and to display not only the contents but also other information. As problem solving means, there is proposed a contents providing system, which includes a display unit for displaying the contents and an interlocked icon interlocked with the contents in one area. Further included is a contents processing device which has a function to change the display format of the display unit in case a signal received when the interlocked icon is displayed in the display unit satisfies a predetermined condition. The contents processing device performs the change of the display format, if the interlocked icon is displayed when the contents processing device receives the signal satisfying the predetermined condition from a remote control device. In case the display format is to be changed, it is possible to perform the display in an enlarged/reduced scale but also to add a new window and to display advertising information in the new window added. | 2009-10-22 |
20090265733 | METHOD AND APPARATUS FOR PROVIDING TARGETED ADVERTISING DURING THE PRESENTATION OF SDV PROGRAMMING - A method is provided for delivering a targeted advertisement to a user who is viewing a switched digital video (SDV) program. The method includes receiving over an access network a user input reflective of the user's advertising preferences. An advertisement is selected at least in part on the user input that is received. During a commercial break in transmission of a program to the user over the access network, the advertisement is transmitted to the user over the access network on an SDV channel. | 2009-10-22 |
20090265734 | System and/or methods for distributing advertisements from a central advertisement network to a peripheral device via a local advertisement server - Certain exemplary embodiments disclosed herein relate to systems and/or methods for distributing advertisements from a central advertisement network to one or more peripheral devices at a location via a local advertisement server. In certain exemplary embodiments, the local advertisement server within a location receives advertisements from the central advertisement network and rebroadcasts them to peripheral devices within that location. Advertising information may be tracked and reported, e.g., for accounting, revenue-sharing, and/or other purposes in certain exemplary embodiments. Thus, in certain exemplary embodiments, the distribution of advertisements is provided to peripherals via a non-web- and non-PC-dependent network. Moreover, in certain exemplary embodiments, reporting and advertising related communications are substantially bi-directional regardless of device type. Certain exemplary embodiments provide revenue sharing among some or all of the central advertising network provider, the proprietors of locations, operators tasked with maintaining the local ad server and/or the peripheral devices, etc. | 2009-10-22 |
20090265735 | METHOD AND APPARATUS FOR OUTPUTTING MEDIA CONTENT - A mobile communication device comprises receiver circuitry operable to receive broadcast real-time media data over a communication interface, and signal processing logic operable to extract real-time media content from the broadcast real-time media data, and output the extracted real-time media content via a user interface of the mobile communication device. In response to determining a partial loss of data for the broadcast real-time media data, the signal processing logic is operable to retrieve stored media content from a memory element of the mobile communication device, and output the retrieved media content via the user interface of the communication device. | 2009-10-22 |
20090265736 | BROADCAST RECEIVING APPARATUS AND FIRMWARE UPGRADE METHOD THEREOF - Provided are a broadcast receiving apparatus and a firmware upgrade method thereof The firmware upgrade method includes receiving firmware which is transmitted from headend equipment through an Ethernet and upgrading the firmware in the broadcast receiving apparatus. The determination whether to upgrade is based on product information transmitted from the headend equipment. | 2009-10-22 |
20090265737 | PUBLISHING KEY FRAMES OF A VIDEO CONTENT ITEM BEING VIEWED BY A FIRST USER TO ONE OR MORE SECOND USERS - Systems and methods for obtaining key frames of video content items being viewed by first users and publishing the key frames of the video content items to second users are provided. In general, either prior to playback of a video content item by a first user or during playback of the video content item by the first user, key frame information providing, referencing, or identifying key frames of the video content item is obtained. Each key frame is representative of a segment of the video content item. The key frame information for the video content item is then published such that each key frame is presented to one or more second users while the first user views the corresponding segment of the video content item. | 2009-10-22 |
20090265738 | METHOD FOR DYNAMICALLY DISPLAYING AUXILIARY DISPLAY DATA - A method for dynamically displaying an auxiliary display data on a screen includes the following steps: (a) receiving a message carrier, and storing at least a data transmitted via the message carrier into a storage device; (b) comparing a received data of the message carrier and a stored data in the storage device; and when the received data differs from the stored data, storing the received data into the storage device for updating the stored data, thereby generating an updated stored data stored in the storage device; and (c) determining whether to display the auxiliary display data corresponding to an altered portion or not, wherein when the auxiliary display data is displayed, an adjusting operation is performed according to the updated stored data to thereby display the auxiliary display data on the screen. | 2009-10-22 |
20090265739 | METHOD AND SYSTEM FOR CHANNEL SELECTION IN A DIGITAL BROADCAST RECEPTION TERMINAL - The present invention discloses a system and method for channel selection in a digital broadcast reception terminal. The system tunes to different frequencies and generates visual clips corresponding to a plurality of channels in a frequency band. Visual clips of multiple channels are simultaneously displayed on a display screen which provides the user an easy way to select a desired program. | 2009-10-22 |
20090265740 | Media storefront for interactive media service device - A storefront for accessing digital media and services is provided. The storefront is installed on an interactive media service device. The storefront displays a list of digital media and services to a user based on the configuration of the interactive media service device and the user profile and preferences. The storefront is connected to a consolidated content catalog containing different types of the digital media. Storefront allows the user to view, browse, select, order and authorize payment for the digital media and services displayed on the screen or menu of the interactive media service device. | 2009-10-22 |
20090265741 | INFORMATION PROCESSING APPARATUS AND METHOD, AND RECORDING MEDIA - An information processing apparatus includes: a program distribution schedule information receiver configured to receive program distribution schedule information; a program-associated information acquirer configured to acquire, for each program listed in the program distribution schedule information, information for identifying content associated with the program and program-associated information including information for identifying a recording media to which the content is recorded; and a display controller configured to control displaying of a program guide by allocating a GUI (Graphical User Interface) for controlling a command for reproducing the content corresponding to the program into each display box of the program on the basis of the received program distribution schedule information and the acquired program-associated information. | 2009-10-22 |
20090265742 | REMOTE ACCESS TO PERSONAL VIDEO PROFILE - A system for providing a user-specific list of programs for online viewing based on a user profile stored in a DVR of a user, said system comprising: (a) a preference server linked to a wide area network and in communication with said DVR and at least one content server having a library of programs available for online delivery to a remote device; and (b) a User Menu hosted by said preference server and particular to said user, said User Menu providing said user-specific list of programs based on said user profile stored in said DVR. | 2009-10-22 |
20090265743 | VIDEO ON DEMAND CONTROL METHOD, CLIENT DEVICE AND SWITCHING CONTROL APPARATUS - The present invention discloses a VOD control method, a client device, and a switching control apparatus, relating to a media playing technology. The method includes: receiving VOD commands from a user; selecting and joining a multicast/broadcast channel with the playing time close to the playing start time of the video program on demand; receiving and buffering the first video program data from a multicast/broadcast server; and judging whether the tolerance between the playing time of the multicast video program on the multicast/broadcast channel and the playing time of the video program on demand is within a threshold, and if so, playing the buffered multicast/broadcast data. The client device includes: a decoding and outputting unit, an obtaining unit, a switching control unit, a unicast control unit, a unicast data receiving and buffering unit, a multicast control unit, and a multicast data receiving and buffering unit. The technical solution provided by the present invention can implement VOD services with few server resources and network bandwidths. | 2009-10-22 |
20090265744 | SYSTEM AND METHOD FOR WIRELESS COMMUNICATION OF VIDEO DATA HAVING PARTIAL DATA COMPRESSION - A system and method for wireless communication of video data are disclosed. One embodiment of the system transmits partially compressed video data from a transmitter to a receiver over a wireless channel. The transmitter is configured to send a plurality of groups of data bits over a wireless channel. The data bits, in an uncompressed form, together form one or more displayable elements representing at least a portion of a video image. The plurality of groups have different degrees of significance to the quality of the video image. The plurality of groups include a first group of uncompressed data bits, and a second group of compressed data bits, wherein the first group has a higher degree of significance to the quality of the video image than the second group. The receiver is configured to receive the plurality of groups of data bits over the wireless channel. The system allows transmission of a large amount of video data over a wireless channel having a limited capacity or a varying condition. | 2009-10-22 |
20090265745 | Reversible Faceplate Terminal Adapter Which Changes Signal Flow Direction - A directional terminal adapter has a housing and a reversible faceplate. Distribution cables of a cable network are connected to the housing and conduct downstream and upstream signals through the housing. Signals flow through the faceplate in a predetermined direction. Reversing the orientation of the faceplate with respect to the housing reverses the direction of flow of the upstream and downstream signals through the directional terminal adapter. | 2009-10-22 |
20090265746 | METHOD AND APPARATUS IN A MEDIA PLAYER - A method and arrangement for switching between a common media stream and a selective media stream of a media session received in a media player including a media buffer entity. Media frames of either a common media stream or a selective media stream are received and buffered in the media buffer entity. A switch at the media buffer entity is then controlled so that the output of the media buffer entity is changed from delivering common media frames to delivering selective media frames, or vice versa, upon detecting a stream switching trigger frame in the received media frames. | 2009-10-22 |
20090265747 | SYSTEMS AND METHODS FOR PROVIDING WEB BASED SELF SERVICED VIDEO MONITORING AND SECURITY FEATURES FOR SYSTEMS COMPRISING IP VIDEO TERMINALS AND SERVERS - A video security system having a server and a video terminal device includes: at least one database for storing network and physical configuration information relating to the terminal device operable to remotely communicate with the server through a distributed network; and one or multiple storage servers for storing video data received from the terminal devices. | 2009-10-22 |
20090265748 | HANDHELD MULTIMEDIA RECEIVING AND SENDING DEVICES - A handheld multimedia device connect to the internet to obtain internet content and transmits formatted content, including internet content, to a display, such as a television. Thus, users of the multimedia device have a platform for watching internet television or movies, listening to internet music, and otherwise experiencing internet content without the need to connect a conventional computer to the television. Moreover, in some embodiments, multimedia device allows for seamless interaction with the internet by using the devices as a pointing device—users point the device where they desire a cursor to be on the screen. | 2009-10-22 |
20090265749 | WIRELESS DISPLAY SYSTEM - A wireless display system includes at least one information providing unit and a display unit to perform wireless transmission between them through a wireless transmission module. The wireless display system further has an identification (ID) code generation unit in the information providing unit and an ID unit in the display unit. The ID code generation unit generates an ID code corresponding to the information providing unit to the display unit. The ID unit receives the ID code and checks the received ID code through an authentication database. In the event that the ID code matches the authentication database a linking signal is sent to the ID code generation unit to allow the display unit to receive and display video information generated by the information providing unit through the wireless transmission module. The display unit performs wireless transmission of the video information to only the corresponding information providing unit and prevents signal chaos. | 2009-10-22 |
20090265750 | TECHNIQUES AND SYSTEMS FOR SUPPORTING PODCASTING - Improved podcasts and techniques that facilitate their use are disclosed. The improved techniques can pertain to creating, publishing, hosting, accessing, subscribing, managing, transferring, and/or playing podcasts. According to one aspect, a client application can subscribe to podcasts and then automatically monitor the podcasts for updates to be downloaded. In the event that user interest in a podcast becomes inadequate, downloading of further updates can be restricted. According to another aspect, a podcast can be subscribed to through use of a portable subscription file. According to still another aspect, podcast feeds can be enhanced to include segment elements and other metadata. | 2009-10-22 |
20090265751 | Reception of ancillary 8VSB signals controlled responsive to information signaling version of broadcast standard being used - Modifications to the system of broadcasting robustly coded ancillary transmissions to mobile and portable receivers of 8VSB digital television signals include version information as part of signal transmissions besides those made specifically to support an electronic service guide (ESG). This version information indicates what version of broadcast standard the signals complied with when transmitted. Such modifications allow such a receiver to determine whether it has the capability to process received ancillary transmissions usefully, without the receiver having to refer to an ESG derived from robustly coded ancillary transmissions that have been fully decoded. Such determination allows the receiver to avoid decoding of the robustly coded ancillary transmissions or to curtail such decoding after partial completion thereof, which reductions in decoding procedures reduce battery drain in battery-powered mobile and portable receivers. A receiver designed to respond to these modifications to the system of broadcasting is much less likely to malfunction owing to the ESG signal containing error when transmitted or accruing error owing to corruption during transmission. | 2009-10-22 |
20090265752 | SYSTEM AND METHOD OF CONTROLLING A MOBILE DEVICE USING A NETWORK POLICY - A method of controlling a mobile device based on a network policy, wherein the network policy is stored on the mobile device when a server or access point is accessed. When a packet is transmitted, it is sent only if it meets the policy parameters as established by the network policy. Parameters may include the type of service or packet, the time of day of the usage, or the maximum tolerable delay permitted. | 2009-10-22 |
20090265753 | USING OPAQUE GROUPS IN A FEDERATED IDENTITY MANAGEMENT ENVIRONMENT - A system and method for using an opaque group within a federated identity management environment, to prevent disclosure of identities of the group. An opaque group is constructed at an identity provider within the system and has a group identity that references primary system identities of its members (e.g., electronic mail addresses, public key certificates, network addresses). Services to the group (e.g., distribution of an object such as a document or electronic mail message, invitation to an online meeting, authentication as a member of the group) can be requested from service providers, but because service providers do not have access to members' primary identities, the service providers forward the requests to an identity provider that has access to the group identity. That identity provider retrieves the members' identities and completes the action. | 2009-10-22 |
20090265754 | Policy Enforcement in Mobile Devices - Systems, methods and computer program products for enabling enforcement of an administrative policy on one or more mobile devices are described herein. In an embodiment, an administrator uses a policy server to create and provide an enforcement policy to a mobile device. An enforcement policy may include information on mobile device resources which may be controlled by an administrator. An enforcement policy also includes information on how mobile device features will be set, configured or disabled. An enforcement device driver and an enforcement monitor on a mobile device use the enforcement policy to control access to resources associated with the mobile device regardless of whether the mobile device is “online” and connected to a network or “offline” and disconnected from a network. | 2009-10-22 |
20090265755 | FIREWALL METHODOLOGIES FOR USE WITHIN VIRTUAL ENVIRONMENTS - In some embodiments a method comprises receiving a virtual universe request, and determining properties of the virtual universe request. The method can also comprise determining a virtual universe firewall security policy, wherein the virtual universe firewall security policy identifies allowable properties associated with the virtual universe request. The method can also include comparing the properties of the virtual universe request to the properties of the virtual universe firewall security policy, and blocking the virtual universe request based on the comparison of the virtual universe request's properties to the virtual universe firewall security policy's allowable properties. | 2009-10-22 |
20090265756 | SAFETY AND MANAGEMENT OF COMPUTING ENVIRONMENTS THAT MAY SUPPORT UNSAFE COMPONENTS - Techniques for managing and protecting computing environments are disclosed. A safe computing environment can be provided for ensuring the safety and/or management of a device. The safe computing environment can be secured by a safe component that isolates and protects it from unsafe computing environments which may also be operating. As a result, various security and management activities can be securely performed from a safe computing environment. A safe computing environment can, for example, be provided on a device as a safe virtual computing environment (e.g., a safe virtual machine) protected by a safe virtual computing monitor (e.g., a safe virtual machine monitor) from one or more other virtual computing environments that are not known or not believed to be safe for the device. It will also be appreciated that the safe components can, for example, be provided as trusted components for a device. As such, various trusted components (or agent) can operate in a trusted computing environment secured from interference by components that many not be trusted and perform various security and/or management tasks alone or in connection, for example, with other trusted components (e.g., trusted serves). | 2009-10-22 |
20090265757 | SYSTEM AND METHOD FOR SECURE NETWORKING IN A VIRTUAL SPACE - Secure networking in a virtual space over a network. Subscriber computing devices each operated by a subscriber are associated with a subscriber identifier. Each computing device is connected to the network. A subscriber security profile is created in a security profile datastore, wherein the subscriber security profile comprises information indicative of a security status and wherein the subscriber security profile is associated with the subscriber's subscriber identifier. Subscriber identifiers associated with subscribers who are logged in to a website are monitored. The website defines a virtual space and the logged-in subscribers are characterized as present in the virtual space. A web page is served to the computing devices of the present subscribers via the network. The web page of a first subscriber comprises a first subscriber icon associated with the first subscriber and subscriber icons of other present subscribers. A determination is made whether the first subscriber security profile matches the subscriber security profile of one or more of the other present subscribers according to security matching criteria. An attribute is assigned to the icons of the other present subscribers having security profiles that match the security profile of the first subscriber according to security matching criteria. Selected security profile information is provided to the first subscriber of a selected one of any of the other present matching subscribers. | 2009-10-22 |
20090265758 | ATTACH DETECTION WITH COATING PUF - The present invention relates to a method of authenticating a physical token ( | 2009-10-22 |
20090265759 | INFORMATION PROCESSING APPARATUS, METHOD OF CONTROLLING SAME, AND STORAGE MEDIUM - An information processing apparatus which is capable of ensuring mutual security in cases where security information is displayed in a state in which an image displayed on a display is open to the outside. A display displays an operation screen of the apparatus. An input section receives an operation instruction to the apparatus, and a network interface receives an operation instruction to the apparatus from an external device. A control section determines whether an instruction for displaying an operation screen containing security information is received from the input section or via the network interface. When determining that the instruction is received via the network interface, the control unit cause screen data for displaying the operation screen to be transmitted to the external device, and the operation screen containing the security information to be prevented from being displayed on the display. | 2009-10-22 |
20090265760 | COMPONENT-ORIENTED ARCHITECTURE FOR WEB MASHUPS - A component-oriented web mashup system and method for communicating between component-oriented Web gadgets to facilitate secure Web mashups. Embodiments of the system and method redefine the traditional definition of gadget to mean a Web component having a verifiable controlled communication channel (a CompoWeb gadget). A CompoWeb gadget is created and defined using new HTML tags and global script objects and functions that extend the functions of the browser. CompoWeb gadget content is treated as a component that is isolated from other gadgets and frames by a browser, and only those allowed access can view data and code therein. Called functions of a CompoWeb gadget are run in the callee's environment instead of the caller's environment. This adds security, because all the requesting CompoWeb gadget receives is the run result. Embodiments of the system and method also include delayed binding of CompoWeb gadgets, such that binding is performed at run time. | 2009-10-22 |
20090265761 | ONLINE HOME IMPROVEMENT DOCUMENT MANAGEMENT SERVICE - An online home improvement document management service includes a host server having a web-based interface adapted to facilitate secure customer access to the host server. The host server is configured to receive home improvement data communicated from the customer through use of a computing device. A processing module is in operative communication with the host server and is configured to process the home improvement data communicated from the customer. A processing software application is trained to classify the processed home improvement data and selectively extract data therefrom based on the classification. The processing software application is configured to selectively present the processed home improvement data for a customer verification via the web-based interface upon at least one of an unsuccessful classification and an unsuccessful extraction of data. A storage device is in operative communication with the processing module and is configured to store the extracted data as metadata upon at least one of the customer verification and the extraction. A content management software application is configured to detect at least one of a customer request through the web-based interface and at least one triggering condition corresponding to the metadata. The content management software application generates at least one report based on the detection of at least one of the customer request and the at least one triggering condition. | 2009-10-22 |
20090265762 | ONLINE MANAGEMENT SERVICE FOR IDENTIFICATION DOCUMENTS - An online identification document management service includes a host server having a web-based interface adapted to facilitate secure customer access to the host server. The host server is configured to receive identification data communicated from the customer through use of a computing device. The identification data includes at least one of an imaged identification document and information related to the imaged identification document. A processing module is in operative communication with the host server and is configured to process the identification data communicated from the customer. A processing software application is trained to classify the processed identification data and selectively extract data therefrom based on the classification. The processing software application is configured to selectively present the processed identification data for a customer verification via the web-based interface upon at least one of an unsuccessful classification and an unsuccessful extraction of data. A storage device is in operative communication with the processing module and is configured to store the extracted data as metadata upon at least one of the customer verification and the extraction of data. The processing software application is cumulatively trained to subsequently classify the processed identification data successfully upon the customer verification thereof. A content management software application operates on the host server and is configured to process a customer request through the web-based interface to selectively generate at least one reproduction of the processed identification data. | 2009-10-22 |
20090265763 | Content-Based Notification and User-Transparent Pull Operation for Simulated Push Transmission of Wireless Email - Exemplary system, method, software and apparatus embodiments provide for creating a content-based notification for a mobile device, as a simulated push operation, for devices which do not have push capability. The system comprises a database, a server, and may also include a second web server for user account configuration. The database is adapted to store user account configuration and preference information. The server is adapted to receive a first message having a first protocol, such as SMTP, and to determine whether the content-based notification for the first message should be provided. When the content-based notification is to be provided, the server is adapted to extract a subset of information from the first message, and using the subset of information, to create a second message having a second, different protocol, such as SMS. The second message is transferred to a wireless network for transmission to the mobile device, with the second message providing the content-based notification of the first message. The information extracted from the first message enables a user to determine whether they want to download the complete message, as a user-transparent pull operation, and typically includes the from, to, size, date, subject fields, and a portion of the body of the first message, up to the remaining capacity of the second message. | 2009-10-22 |
20090265764 | AGGREGATION AND USE OF INFORMATION RELATING TO A USERS CONTEXT - Information, called context information, relating to a current state of a user may be aggregated. In one implementation, the context information may include information that is automatically generated by communication devices of the user and information, submitted by the user, that relates to the user's state. The context information may be used by authorized context consumers. | 2009-10-22 |
20090265765 | System and Methods for Managing Trust in Access Control Based on a User Identity - System and methods for managing trust in access control are based on a user identity, in a Universal Plug and Play (UPnP) network. A device has an access control list (ACL), a trusted-to-identify access control list (TIA), and a first TIA management module configured to manage the TIA. A security console is communicatively coupled to the device via the network. The security console has a second TIA management module. The first TIA management module is able to implement an add request from the security console for adding an entry to the TIA. The entry includes a control point identity for a control point communicatively coupled to the device via the network. | 2009-10-22 |
20090265766 | Supplying Web Pages - A system is shown that supplies web pages from servers ( | 2009-10-22 |
20090265767 | METHODS AND ARRANGEMENTS FOR PREFIX MANAGEMENT IN MOVING NETWORKS - The present invention relates to prefix management in a moving network comprising a first mobile router which is assigned a first prefix for use when passing traffic to and from a home agent with which the first mobile router is associated, and a second mobile router. The present invention relates to methods and arrangements in the first mobile router, the second mobile router and the home agent for delegating the right to use said first prefix to said second mobile router in a secure manner by means of first and second authentication information that may be compared to verify that the second mobile router has the right to use the first prefix. | 2009-10-22 |
20090265768 | METHOD AND APPARATUS FOR THE SECURE IDENTIFICATION OF THE OWNER OF A PORTABLE DEVICE - An authentication system is provided that includes a portable device and a decryption node. An individual uses the portable device, such as a portable device like a cell phone to compute a challenge and a response. The challenge and response is sent to a decryption node. In response, the decryption node computes a presumed response and compares the presumed response to the response of the portable device, in order to authenticate the individual associated with the portable device. | 2009-10-22 |
20090265769 | METHOD FOR AUTOMATICALLY GENERATING AND FILLING IN LOGIN INFORMATION AND SYSTEM FOR THE SAME - A system for automatically generating and filling login information to improve the security in storage and use of the login information. The system comprises a monitoring module, a registration module, and a login module; the monitoring module is coupled to the registration module and the login module; the monitoring module is adapted to check for an entry of login information corresponding to the identifier of the current page, and prompt a result to the user, and transmit a signal to the registration module and the login module to perform a registration and/or login operation; the registration module comprises a login information generation unit, a login information storage unit, and a first user confirmation unit; and the login module comprises a login information input unit and a second user confirmation unit. A method for the same is also disclosed. | 2009-10-22 |
20090265770 | SECURITY SYSTEM BASED ON QUESTIONS THAT DO NOT PUBLICLY IDENTIFY THE SPEAKER - A method and system for authenticating a user seeking access to a secured system in a public area. Access is granted when a user demonstrates sufficient knowledge of the user's personal characteristics stored in the system. The user initiates the access process by tapping into the stored characteristics without overtly stating information that may be overheard. The user statements reflect an awareness about the categories of user uniqueness without divulging details. The system response statements act to elicit further information from the user for response and the response statements are scored. After a cumulative score threshold is met, the user is granted access. | 2009-10-22 |
20090265771 | System and method for hosting multiple kerberos service principal names - An authentication system and method for allowing an administrator to host a plurality of service principal names (SPNs) over a common network port of a backend server. The authentication system includes a client computer, a backend server, and a service principal name (SPN) apparatus. The client computer sends an authentication request to the backend server. The backend server performs an authentication procedure in response to a reception of the authentication request from the client computer. The SPN apparatus configures a plurality of service SPNs for the web service application over the common network port. | 2009-10-22 |
20090265772 | Secure Key Distribution to Internet Clients - A server may bridge between a wide area network, such as the Internet, and a local area network and may process authentication requests from clients on the wide area network. The server may filter the requests to enable specific types of requests to pass, and may forward the requests to a credential server within the local area network and pass any responses back to the client. The server may be configured with some or all of a set of domain services objects, but such objects may be stored in a read only format. The server may further contain a minimum of or no sensitive data such that, if compromised, an attacker may gain little advantage. The client may request evidence of authentication available to devices within the local area network and may use the evidence of authentication to access services made available to the wide area network. | 2009-10-22 |
20090265773 | SYSTEM AND METHOD FOR PASSWORD-FREE ACCESS FOR VALIDATED USERS - A new approach is proposed that first validates identity of a user/individual who is initiating a request for a web service for the first time. Once validated, the user is allowed to access the web service, to register securely with the provider of the web service, and to create a series of personalized questions to be used for future validation purposes. During the user's subsequent request for the web service, the user will be asked, in addition to his/her user name, one or more of the personalized questions he/she created on rotation basis in place of a PIN or password. | 2009-10-22 |
20090265774 | Method and Apparatus for Tracking Functional States of a Web-Site and Reporting Results to Web Developers - A software tool for enabling automated tracking of activity related to the status and usage statistics of a plurality of Web sites on a data packet network is provided. The software tool comprises a network communication capability for establishing network communication between the software tool and the tracked Web sites; a plurality of data-reporting modules for obtaining and reporting data about tracked Web sites; a data input function for excepting data from the reporting modules and from external sources; a data recording function for recording and logging the data received from the reporting modules and from the external sources; and a data management function for organizing and storing the received data and rendering the data accessible for use in software development. A software engineer or developer accesses the site-tracking software and connected database through a Web browser from a network-connected workstation in order to utilize data mined from Web sites for the purpose of creating routines enabling automated navigation and site manipulation by proxy for subscribed users. | 2009-10-22 |
20090265775 | Proximity Based Authentication Using Tokens - The present invention relates to authenticating a mobile device using location information associated with the device. The present invention provides a mechanism for authenticating a mobile device based on location related information or a “logical location”, but without requiring an actual location. The mobile user device gathers tokens such as SIM data from other wireless devices using wireless communication between the user device and the other devices. A server determines whether these tokens match predetermined reference information, and if so authenticates the user device. | 2009-10-22 |
20090265776 | AUTHENTICATION OF DATA COMMUNICATIONS - Methods and apparatus are provided for authenticating communications between a user computer and a server via a data communications network. A security device has memory containing security data, and security logic to use the security data to generate an authentication response to an authentication message received from the server in use. An interface device communicates with the security device. The interface device has a receiver for receiving from the user computer an authentication output containing the authentication message sent by the server to the user computer in use, and interface logic adapted to extract the authentication message from the authentication output and to send the authentication message to the security device. Includes a communications interface for connecting to the server via a communications channel bypassing the user computer. Either the security device or interface device sends the authentication response to the server via the communications channel bypassing the user computer. | 2009-10-22 |
20090265777 | COLLABORATIVE AND PROACTIVE DEFENSE OF NETWORKS AND INFORMATION SYSTEMS - Collaborative and proactive defense of networks and information systems. The present examples of collaborative and proactive defense of networks and information systems provides a way of protecting computer networks from hackers by stopping them from entering a protected network. Protection may be include processes that utilize communications between layers in a communications protocol stack, or its equivalent to identify threats. Identified threats may be profiled and stored in a local and/or network database that may be shared among other subscribers. Once a threat is identified it may be blocked, redirected or otherwise processed to thwart, identify, or otherwise deal with the threat. Such protection may be termed the collaborative and proactive defense of networks and information systems. | 2009-10-22 |
20090265778 | Attack protection for a packet-based network - The invention relates to a protection unit ( | 2009-10-22 |
20090265779 | TIME-SWITCH DEVICE AND METHOD FOR THE SAME - A time-switch device and method for the same is provided. The time-switch device mainly comprises a microprocessor unit, and an input element and a key secret element that are connected to the microprocessor unit. The microprocessor unit is connected to a data storage unit storing the time switch method and to a power control unit to control the connected host turning ON or OFF in a predetermined time of the schedule set in the time switch method stored in the time-switch device. Thus, the time-switch device and method for the same may not only force a user to use the host in a limited service time, but also prevent data in the host from being leaked. | 2009-10-22 |
20090265780 | ACCESS EVENT COLLECTION - On-line and computationally efficient methods and systems are provided for back resolving path names of files from inode numbers during data access request processing. As a result, a near real-time recording of data access events is achieved, including identification of the user who performed the access, and the full path name of the data object that was accessed. In a typical application, access events are collected for use in access control of storage elements in complex organizational file systems. | 2009-10-22 |
20090265781 | Location information verification - Location information is provided with an authenticator in order to enable future providing of an authentication to a service or application making use of the location information. The authenticator is based on a cryptographic method known by a provider and recipient of and also optionally based on position data provided by the location information. The authenticator is carried as a watermark in the location information so that the location information can be used by prior existing systems and enables the authentication of the location information in compatible authentication enabled systems. On receiving the location information, an authentication enabled recipient obtains the authenticator from the location information and checks using the authenticator whether use of the location information may be allowed. | 2009-10-22 |
20090265782 | MOBILE STATION AND METHOD FOR AVOIDING ATTACKS - A mobile station wirelessly communicates with an access point during an awake mode of the mobile station through a wireless network and avoids attacks from an attacking station. The mobile station includes a detecting module, an attack-proof module, and a data transmission module. The detecting mobile is configured for detecting a fake null frame from the wireless network during the awake mode. The fake null frame is for interrupting communication between the mobile station and the access point in order for the mobile station to enter a power saving mode. The attack-proof module is configured for transmitting an attack-proof frame to the access point so as to notify the access point that the mobile station has not entered into the power saving mode. The data transmission module is for transmitting data to the access point and receiving data from the access point. A method for avoiding attacks is also provided. | 2009-10-22 |
20090265783 | Method to Enhance Platform Firmware Security for Logical Partition Data Processing Systems by Dynamic Restriction of Available External Interfaces - A system and method to reduce external access to hypervisor interfaces in a computer system, thereby reducing the possibility of attacks. In a preferred embodiment, addresses for calls are used to fill a table, where the addresses are specifically selected for a requesting computer. For example, in one embodiment, a routine searches for the adapter type of a requesting computer and populates the table with calls specific to that type of adapter. Other types of calls are not put in the table. Instead, those calls are replaced by routines that will return an error. In other embodiments, the operating system type is used to determine what addresses are used to populate the table. These and other embodiments are explained more fully below. | 2009-10-22 |
20090265784 | NETWORK FAILURE DETECTION METHOD AND NETWORK FAILURE DETECTION SYSTEM - A system provides definitions of network states, and identifies a cause for the anomaly upon detection. A traffic measuring portion (characteristic quantity generating portion) counts the number of packets/time slot classified by traffic type with respect to network traffic, generating a characteristic quantity; a memory portion stores information about the characteristic quantity; a portion calculates correlation coefficients between each pair of characteristic quantities classified by traffic type; a portion generates a histogram from correlation coefficients; a portion for determining the severity of an anomaly based on the histogram; a portion evaluates the similarity of an anomaly of interest to a reference anomaly using the occurrence probabilities of correlation coefficients; and a portion assigns a color to each pixel according to its occurrence probability value, generating an n×n picture. Visualization of network state is achieved using probability distribution vectors derived from correlation coefficients obtained from each characteristic quantities pair. | 2009-10-22 |
20090265785 | SYSTEM AND METHOD FOR ARP ANTI-SPOOFING SECURITY - A system and method that provides for copying ARP replies, and generating data packets which include the ARP reply, and other information such as an identification of the port on the ARP reply was received. These data packets are then transmitted to an ARP collector which stores the ARP reply and port information. The ARP collector then uses this stored information, and analyzes future data packets relative to the stored information to detect occurrences of ARP spoofing. The ARP collector further provides for generating alerts and taking security actions when ARP reply spoofing is detected. | 2009-10-22 |
20090265786 | AUTOMATIC BOTNET SPAM SIGNATURE GENERATION - A framework may be used for generating URL signatures to identify botnet spam and membership. The framework may take a set of unlabeled emails as input that are grouped based on URLs contained within the emails. The framework may return a set of spam URL signatures and a list of corresponding botnet host IP addresses by analyzing the URLs within the emails that are contained within the groups. Each URL signature may be in the form of either a complete URL string or a URL regular expression. The signatures may be used to identify spam emails launched from botnets, while the knowledge of botnet host identities can help filter other spam emails also sent by them. | 2009-10-22 |
20090265787 | SECURITY MATURITY ASSESSMENT METHOD - In general, the invention relates to a method for assessing an information security policy and practice of an organization. The method includes collecting information about the information security policy and practice of the organization, generating a rating for each of a plurality of information security items using a security maturity assessment matrix and the collected information, and generating a graphical assessment of the ratings. The security maturity assessment matrix includes a first dimension and a second dimension, where the first dimension corresponds to the information security items and the second dimension corresponds to maturity levels. Further, each rating is derived using the first dimension and the second dimension. | 2009-10-22 |
20090265788 | METHOD AND DEVICE FOR THE PSEUDONYMIZATION OF DIGITAL DATA - A system and method for pseudonymizing digital data records sent from a source system to a destination system, using an identity protector client system and an identity protector master system, includes the steps of receiving, at the identity protector client, person-specific data from a source system provided with a source identifier. The digital data records are pre-pseudonymized by the identity protector client, and the processed digital data records are marked with a source identifier which references the source file in the source system. The pre-pseudonymized digital data records are transmitted to the identity protector master. For every data record, a pseudonym is created by the identity protector master from the pre-pseudonym, the source identifier, and at least one other value generated from an erratic value and a time value. The pseudonym is transmitted to the destination system. | 2009-10-22 |
20090265789 | PREVENTING UNAUTHORIZED DISTRIBUTION OF MEDIA CONTENT WITHIN A GLOBAL NETWORK - One embodiment of the invention is a method for providing media content while preventing its unauthorized distribution. The method includes transmitting from a client to an administrative node a request for delivery of an instance of media content (IMC); determining which content source (CS) of a plurality of CSs to provide delivery of the IMC, provided the client is authorized to receive the IMC; transmitting to the client an access key and a location of the IMC; transmitting from the client to the CS a second request and the access key; in response to receiving the second request and the access key, transferring the IMC from the CS to the client; transmitting from the client to the administrative node an indicator indicating a successful transfer of the IMC; and generating a transaction applicable to the client and associated with the transfer of the IMC to the client. | 2009-10-22 |
20090265790 | CONTENT PROVIDING SYSTEM, CONTENT PROVIDING SERVER, INFORMATION PROCESSING APPARATUS, AND COMPUTER PROGRAM - A content providing system is disclosed, which includes: a content providing server that is capable of delivering content data and information related thereto through a communication network; and a client that is capable of downloading the content data and the information related thereto through the communication network, wherein a management unit manages meta information of the respective content data as content item information, manages one or plural pieces of content item information as content program information in association with one another, and manages one or plural pieces of content program information as a content program catalogue, one content data and meta information thereof can be referred to in plural pieces of content item information, one piece of content item information can be referred to in plural pieces of content program information, and one piece of content program information can be referred to in plural content program catalogues, and when a term of availability of the content program catalogue has expired, the management unit deletes content program information included in the content program catalogue and/or content item information included in the content program information and/or content data included in the content item information. | 2009-10-22 |
20090265791 | METHOD A SYSTEM AND A UNIT FOR CONTROLLING LISTING OF ITEMS ON ELECTRONIC MARKET DATABASES - There is provided a method a method for controlling listing of a given item on an electronic market database, the method comprising (1) receiving a listing request originated from a prospective provider for listing said given item on said electronic market database; (2) authenticating at least one of said given item and of said prospective provider; and (3) if a successful authentication, listing said given item on said electronic database. There is further provided a system as well as a unit for controlling listing of a given item on an electronic market database. | 2009-10-22 |
20090265792 | Memory security override protection for manufacturability of information handling systems - Systems and methods are disclosed for providing memory security override protection for improved manufacturability of information handling systems. A security authentication system is added to a software driven security override signal for unlocking programmable memory circuitry, such as flash memory, according to security protection techniques associated with the Intel AMT (Active Management Technology) architecture. This security authentication system disclosed requires authentication of software security override requests before they are allowed. More particularly, the systems and methods disclosed add specific BIOS (Basic Input Output System) code to check the security override status and the software security override request signals on boots of the computer system to make sure these requests are not coming from rogue elements within the computer system. If the authentication is validated, then the programmable memory circuitry is unlocked on the next boot of the system to allow for reprogramming. | 2009-10-22 |
20090265793 | PREVENTING UNAUTHORIZED DISTRIBUTION OF MEDIA CONTENT WITHIN A GLOBAL NETWORK - One embodiment of the invention is a method for providing media content while preventing its unauthorized distribution. The method includes transmitting from a client to an administrative node a request for delivery of an instance of media content (IMC); determining which content source (CS) of a plurality of CSs to provide delivery of the IMC, provided the client is authorized to receive the IMC; transmitting to the client an access key and a location of the IMC; transmitting from the client to the CS a second request and the access key; in response to receiving the second request and the access key, transferring the IMC from the CS to the client; transmitting from the client to the administrative node an indicator indicating a successful transfer of the IMC; and generating a transaction applicable to the client and associated with the transfer of the IMC to the client. | 2009-10-22 |
20090265794 | METHOD AND APPARATUS FOR ENABLING ACCESS TO CONTACT INFORMATION - A method, an apparatus and a processor readable medium for enabling access to contact information. The contact information for contacting a recipient may be accessed in accordance with a rights object. | 2009-10-22 |
20090265795 | Methods of Inhibiting Multiple Cytochrome P450 Genes with siRNA - The present invention relates to siRNAs that are targeted to RNAs encoding two or more enzymes of a subfamily of cytochrome P450 (CYP) enzymes, along with vectors, cells, and kits comprising the siRNAs. The invention further relates to methods of decreasing expression of two or more CYP subfamily genes in a non-human animal, animals in which expression of two or more CYP subfamily genes has been decreased, and methods of using such animals to study the function of cytochrome P450 enzymes. | 2009-10-22 |
20090265796 | Adeno-associated virus vectors - The invention provides an isolated and purified DNA molecule comprising at least one DNA segment, a biologically active subunit or variant thereof, of a circular intermediate of adeno-associated virus, which DNA segment confers increased episomal stability, persistence or abundance of the isolated DNA molecule in a host cell. The invention also provides a composition comprising at least two adeno-associated virus vectors. | 2009-10-22 |
20090265797 | Novel Anti-IGF-IR Antibodies and Uses Thereof - The present invention relates to novel antibodies capable of binding specifically to the human insulin-like growth factor I receptor (IGF-IR). The invention likewise comprises the use of these antibodies as a medicament for the prophylactic and/or therapeutic treatment of cancers overexpressing IGF-IR, stimulated either by IGF1 and/or IGF2, or any pathology connected with the overexpression of said receptor as well as in processes or kits for diagnosis of illnesses connected with the overexpression of the IGF-IR and/or the IGF-I/Insulin hybrid receptor. | 2009-10-22 |
20090265798 | Desaturase genes and uses thereof - The subject invention relates to the identification of genes involved in the desaturation of polyunsaturated fatty acids at carbon 5 (i.e., “Δ5-desaturase”) and at carbon 6 (i.e., “Δ6-desaturase”) and to uses thereof. In particular, Δ5-desaturase may be utilized, for example, in the conversion of dihomo-γ-linolenic acid (DGLA) to arachidonic acid (AA) and in the conversion of 20:4n-3 to eicosapentaenoic acid (EPA). Delta-6 desaturase may be used, for example, in the conversion of linoleic (LA) to γ-linolenic acid (GLA). AA or polyunsaturated fatty acids produced therefrom may be added to pharmaceutical compositions, nutritional compositions, animal feeds, as well as other products such as cosmetics. | 2009-10-22 |
20090265799 | Soybean Cultivar 7524005 - A soybean cultivar designated 7524005 is disclosed. The invention relates to the seeds of soybean cultivar 7524005, to the plants of soybean 7524005, to plant parts of soybean cultivar 7524005 and to methods for producing a soybean plant produced by crossing soybean cultivar 7524005 with itself or with another soybean variety. The invention also relates to methods for producing a soybean plant containing in its genetic material one or more transgenes and to the transgenic soybean plants and plant parts produced by those methods. This invention also relates to soybean cultivars or breeding cultivars and plant parts derived from soybean variety 7524005, to methods for producing other soybean cultivars, lines or plant parts derived from soybean cultivar 7524005 and to the soybean plants, varieties, and their parts derived from use of those methods. The invention further relates to hybrid soybean seeds, plants and plant parts produced by crossing the cultivar 7524005 with another soybean cultivar. | 2009-10-22 |
20090265800 | Soybean Cultivar S070149 - A soybean cultivar designated S070149 is disclosed. The invention relates to the seeds of soybean cultivar S070149, to the plants of soybean S070149, to plant parts of soybean cultivar S070149 and to methods for producing a soybean plant produced by crossing soybean cultivar S070149 with itself or with another soybean variety. The invention also relates to methods for producing a soybean plant containing in its genetic material one or more transgenes and to the transgenic soybean plants and plant parts produced by those methods. This invention also relates to soybean cultivars or breeding cultivars and plant parts derived from soybean variety S070149, to methods for producing other soybean cultivars, lines or plant parts derived from soybean cultivar S070149 and to the soybean plants, varieties, and their parts derived from use of those methods. The invention further relates to hybrid soybean seeds, plants and plant parts produced by crossing the cultivar S070149 with another soybean cultivar. | 2009-10-22 |
20090265801 | Soybean Cultivar 7643392 - A soybean cultivar designated 7643392 is disclosed. The invention relates to the seeds of soybean cultivar 7643392, to the plants of soybean 7643392, to plant parts of soybean cultivar 7643392 and to methods for producing a soybean plant produced by crossing soybean cultivar 7643392 with itself or with another soybean variety. The invention also relates to methods for producing a soybean plant containing in its genetic material one or more transgenes and to the transgenic soybean plants and plant parts produced by those methods. This invention also relates to soybean cultivars or breeding cultivars and plant parts derived from soybean variety 7643392, to methods for producing other soybean cultivars, lines or plant parts derived from soybean cultivar 7643392 and to the soybean plants, varieties, and their parts derived from use of those methods. The invention further relates to hybrid soybean seeds, plants and plant parts produced by crossing the cultivar 7643392 with another soybean cultivar. | 2009-10-22 |
20090265802 | WHEAT VARIETY 25R62 - A wheat variety designated 25R62, the plants and seeds of wheat variety 25R62, methods for producing a wheat plant produced by crossing the variety 25R62 with another wheat plant, and hybrid wheat seeds and plants produced by crossing the variety 25R62 with another wheat line or plant, and the creation of variants by mutagenesis or transformation of variety 25R62. This invention also relates to methods for producing other wheat varieties or breeding lines derived from wheat variety 25R62 and to wheat varieties or breeding lines produced by those methods. | 2009-10-22 |
20090265803 | DOWNY MILDEW RESISTANT CUCUMBER PLANTS - The present invention relates to cucumber lines having increased resistance to Downy Mildew. The present invention also relates to parts of cucumber plants from lines having increased Downy Mildew resistance, including seeds capable of growing cucumber plants with increased Downy Mildew resistance. Further provided are methods of producing such plants by genetic marker assisted selection. | 2009-10-22 |
20090265804 | NUCLEOTIDE SEQUENCES ENCODING ENZYMES IN BIOSYNTHESIS OF DIHYDROARTEMISINIC ACID - Isolated nucleic acid molecules cloned from | 2009-10-22 |
20090265805 | Glutamate receptors in nutrient sensing, metabolism, Growth and Development - The present invention relates to methods that may be used to improve or modify nutrient sensing, absorption, metabolism, root growth, stomatal conductance, N use efficiency, C and N metabolism, plant biomass production and seed yield. More specifically, this invention is related to the glutamate receptors (GLRs) and their role(s) in nutrient sensing, metabolism, regulation of growth, development, and yield. | 2009-10-22 |
20090265806 | PERICARP-PREFERRED REGULATORY ELEMENT - The present invention provides compositions and methods for regulating expression of heterologous nucleotide sequences in a plant. Compositions are novel nucleotide sequences for a pericarp-preferred promoter and terminator isolated from the maize lipid transfer protein 1 coding region. A method for expressing a heterologous nucleotide sequence in a plant using the regulatory sequences disclosed herein is provided. The method comprises transforming a plant cell to comprise a heterologous nucleotide sequence operably linked to one or more of the regulatory sequences of the present invention and regenerating a stably transformed plant from the transformed plant cell. | 2009-10-22 |
20090265807 | Polynucleotides and polypeptides in plants - The invention relates to plant transcription factor polypeptides, polynucleotides that encode them, homologs from a variety of plant species, and methods of using the polynucleotides and polypeptides to produce transgenic plants having advantageous properties compared to a reference plant. Sequence information related to these polynucleotides and polypeptides can also be used in bioinformatic search methods and is also disclosed. | 2009-10-22 |
20090265808 | P15 HAIRPIN CONSTRUCTS AND USE - The present invention concerns a method of genetic modification of a TGB-3 wild type viral sequence for reducing or suppressing the possible deleterious effects of the agronomic properties of a transformed plant or plant cell by said TGB-3 viral sequence. The invention further relates to genetically modified TGB-3 viral sequences suitable to induce gene silencing. In particular hairpin constructs based on such sequences proved highly efficient to induce a PTGS mechanism and degradation of the whole of RNA2 thereby. When plants are transformed accordingly the spread of the virus in the plant is significantly reduced or blocked. | 2009-10-22 |
20090265809 | Modified Cry3A Toxins and Nucleic Acid Sequences Coding Therefor - Methods for making a modified Cry3A toxin are disclosed. Such methods include the insertion of a protease recognition site that is recognized by a gut protease of a target insect, such as corn rootworm, into at least one position of a Cry3A toxin so that a modified Cry3A toxin is thus designed. The coding sequence of the modified Cry3A toxin may be transformed into a host cell and the host cell grown under conditions that allow the host cell to produce the modified Cry3A toxin. The host cell may be a plant cell and the plant may be comprised in a transgenic plant. Thus, the transgenic plant may be used to produce the modified Cry3A toxin. | 2009-10-22 |
20090265810 | Arabidopsis genes encoding proteins involved in sugar and lipid metabolism and methods of use - Isolated nucleic acids and polypeptides associated with lipid and sugar metabolism regulation are provided. In particular, lipid metabolism proteins (LMP) and encoding nucleic acids originating from | 2009-10-22 |
20090265811 | MAIZE PLANTS WITH REDUCED GENE SILENCING - Maize plants with reduced gene silencing are disclosed. | 2009-10-22 |
20090265812 | Plant Gene Promoter and its Use - A method for protecting a plant from high temperature stress (HTS), comprising transforming the plant with a polynucleotide sequence. The polynucleotide sequence comprises a nucleotide sequence encoding a sugar kinase under the control of an anther and/or pollen specific promoter, thereby producing a transformed plant having improved tolerance to HTS. Also disclosed is the polynucleotide sequence of the LeFRK4 promoter. | 2009-10-22 |
20090265813 | STRESS TOLERANCE IN PLANTS - Transcription factor polynucleotides and polypeptides incorporated into expression vectors have been introduced into plants and were ectopically expressed. Transgenic plants transformed with many of these expression vectors have been shown to be more resistant to disease (in some cases, to more than one pathogen), or more tolerant to an abiotic stress (in some cases, to more than one abiotic stress). The abiotic stress may include salt, hyperosmotic stress, heat, cold, drought, or low nitrogen conditions. | 2009-10-22 |
20090265814 | Plant transformation with in vivo assembly of a sequence of interest - A process of producing transgenic plants or plant cells stably transformed on a chromosome with a DNA sequence of interest and capable of expressing a function of interest from said DNA sequence of interest, said process comprising (a) providing plant cells or plants with at least two different vectors, whereby (i) said at least two different vectors are adapted to recombine with each other by site-specific recombination in said plant cells for producing a non-replicating recombination product containing said DNA sequence of interest, (ii) said at least two different vectors are adapted for integrating said DNA sequence of interest into said chromosome, (iii) said DNA sequence of interest contains sequence portions from at least two of said at least two different vectors, said sequence portions being necessary for expressing said function of interest from said DNA sequence of interest; and (b) selecting plants or plant cells expressing said function of interest. | 2009-10-22 |
20090265815 | Sequence-determined DNA fragments and corresponding polypeptides encoded therapy - The present invention provides DNA molecules that constitute fragments of the genome of a plant, and polypeptides encoded thereby. The DNA molecules are useful for specifying a gene product in cells, either as a promoter or as a protein coding sequence or as an UTR or as a 3′ termination sequence, and are also useful in controlling the behavior of a gene in the chromosome, in controlling the expression of a gene or as tools for genetic mapping, recognizing or isolating identical or related DNA fragments, or identification of a particular individual organism, or for clustering of a group of organisms with a common trait. One of ordinary skill in the art, having this data, can obtain cloned DNA fragments, synthetic DNA fragments or polypeptides constituting desired sequences by recombinant methodology known in the art or described herein | 2009-10-22 |
20090265816 | Isolated nucleic acid molecules from the genome of citrus leprosis virus and uses thereof - The present invention relates to nucleic acid molecules found in the genome of the Citrus Leprosis Virus (CiLV), which is associated to Citrus Leprosis (CiL) disease. The cloned CiLV nucleic acid molecules can be used as probes or can be used to design oligonucleotide primers useful in assays, such as a polymerase chain reaction, for detecting the presence of CiLV in biological samples, particularly leaves, roots and other tissues or organs of plants, such as plants from the genera | 2009-10-22 |
20090265817 | T227-1 FLANKING SEQUENCE - A herbicide resistant transformed sugar beet that is detectable by the specific primers developed to match the DNA sequences that flank the left and/or right border region of the inserted transgenic DNA and the method of identifying primer pairs containing plant genomic DNA/plasmid DNA. More specifically, the present invention covers a specific glyphosate resistant sugar beet plant having an insertion of the transgenic material identified as the T227-1 event. The present invention additionally covers primer pairs: plant genomic DNA/Plasmid DNA that are herein identified. Additionally, these primer pairs for either the left or the right flanking regions make an event specific test for the T227-1 insert of transgenic material. | 2009-10-22 |
20090265818 | COMPOSITIONS AND METHODS FOR THE SUPPRESSION OF TARGET POLYNUCLEOTIDES FROM LEPIDOPTERA - Methods and compositions are provided which employ a silencing element that, when ingested by a pest, such as a pest from the Lepidoptera order, they are capable of decreasing the expression of a target sequence in the pest. In specific embodiments, the decrease in expression of the target sequence controls the pest and thereby the methods and compositions are capable of limiting damage to a plant. The present invention provides target polynucleotides encoding polypeptides from specific protein families and various target polynucleotides set forth in SEQ ID NOS: 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49, or 50 or active variants and fragments thereof, wherein a decrease in expression of one or more the sequences in the target pest controls the pest (i.e., has insecticidal activity). Further provided are silencing elements which when ingested by the pest decrease the level of the target polypeptide and thereby control the pest. In specific embodiment, the pest is | 2009-10-22 |
20090265819 | SENSOR FOR OBSERVATIONS IN LIQUID ENVIRONMENTS AND OBSERVATION APPARATUS FOR USE IN LIQUID ENVIRONMENTS - The sensor has the self-detecting probe including a body portion, an elongated belt-like flexible substrate, connecting members, a resinous portion, and external contacts formed at the ends of the flexible substrate brought out of liquid. The probe further includes a cantilever whose base end is supported to the body portion, a strain resistive element whose resistance value varies according to the amount of displacement of the cantilever, and interconnects electrically connected with the strain resistive element. A probe tip is formed at the front end of the cantilever. The flexible substrate has an interconnect pattern sandwiched between two insulating sheets. The flexible substrate supports the body portion while the cantilever protrudes outwardly. At least one end of the flexible substrate is brought out of liquid. The connecting members connect the interconnects with the interconnect pattern. The interconnects, connecting members, and the portions of the connecting members electrically connected with the interconnect pattern are coated with the resinous portion. | 2009-10-22 |
20090265820 | Corylus plant named 'Red Dragon' - A new and distinct cultivar of | 2009-10-22 |
20090265821 | COREOPSIS PLANT NAMED 'GOLDEN DREAM' - A new and distinct cultivar of | 2009-10-22 |
20090265822 | Tiarella Plant Named 'Snow Blanket' - A new and distinct cultivar of | 2009-10-22 |
20090265823 | Erodium plant named 'Claret' - A new cultivar of | 2009-10-22 |
20090265824 | NEPHROLEPIS PLANT NAMED 'ARIANE' - A new and distinct | 2009-10-22 |
20090265825 | PHILODENDRON PLANT NAMED 'LEMON LIME' - A new and distinct | 2009-10-22 |