49th week of 2011 patent applcation highlights part 61 |
Patent application number | Title | Published |
20110302584 | SYNTHESIS OF CONCURRENT SCHEDULERS FOR MULTICORE ARCHITECTURES - Systems and methods provide a high-level language for generation of a scheduling specification based on a scheduling policy, and synthesis of scheduler based on the scheduling specification. The systems and methods can permit the use of more sophisticated scheduling strategies than those afforded by conventional systems, without requiring the programmer to write explicitly parallel code. In certain embodiments, synthesis of the scheduler includes implementation of at least one rule related to the scheduling specification through definition of one or more workset objects that are concurrent, a workset object of the one or more workset objects having an addition method, a first poll method, and a second poll method. Such poll methods extend the operability of sequential poll methods. The one or more worksets satisfy a condition for correctness that is less stringent than conventional conditions for correctness. | 2011-12-08 |
20110302585 | Techniques for Providing Improved Affinity Scheduling in a Multiprocessor Computer System - Techniques for controlling a thread on a computerized system having multiple processors involve accessing state information of a blocked thread, and maintaining the state information of the blocked thread at current values when the state information indicates that less than a predetermined amount of time has elapsed since the blocked thread ran on the computerized system. Such techniques further involve setting the state information of the blocked thread to identify affinity for a particular processor of the multiple processors when the state information indicates that at least the predetermined amount of time has elapsed since the blocked thread ran on the computerized system. Such operation enables the system to place a cold blocked thread which shares data with another thread on the same processor of that other thread so that, when the blocked thread awakens and runs, that thread is closer to the shared data. | 2011-12-08 |
20110302586 | MULTITHREAD APPLICATION-AWARE MEMORY SCHEDULING SCHEME FOR MULTI-CORE PROCESSORS - A device may include a memory controller that identifies a multithread application, and adjusts a memory scheduling scheme for the multithread application based on the identification of the multithread application. | 2011-12-08 |
20110302587 | INFORMATION PROCESSING DEVICE AND INFORMATION PROCESSING METHOD - A system-level management unit generates a system processing and makes a processing request to a task allocation unit of a user-level management unit. The task allocation unit schedules the system processing according to a procedure of an introduced user-level scheduling. A processing unit assigned to execute the system processing sends a notification of acceptability of the system processing to a main processing unit, by halts an application task in appropriate timing or when the processing of the current task is completed. When the notification is received within the time limit for execution, the system-level management unit has the processing unit start the system processing. | 2011-12-08 |
20110302588 | Assigning Priorities to Threads of Execution - Systems and processes may be implemented to receive threads of execution and assign priorities to the threads of execution. Threads of execution may include nonvolatile memory input/output threads, other input/output threads, and/or other non-input/output threads. A lower priority may be assigned to nonvolatile memory input/output threads than other input/output threads. An algorithm may determine an order of execution of the threads of execution. An order of execution may be at least partially based on assigned priorities. | 2011-12-08 |
20110302589 | METHOD FOR THE DETERMINISTIC EXECUTION AND SYNCHRONIZATION OF AN INFORMATION PROCESSING SYSTEM COMPRISING A PLURALITY OF PROCESSING CORES EXECUTING SYSTEM TASKS - An information processing system includes two processing cores. The execution of an application by the system includes the execution of application tasks and the execution of system tasks, and the system includes a micro-kernel executing the system tasks, which are directly linked to hardware resources. The processing system includes a computation part of the micro-kernel executing system tasks relating to the switching of the tasks on a first core, and a control part of the micro-kernel executing, on a second core, system tasks relating to the control of the task allocation order on the first core. | 2011-12-08 |
20110302590 | PROCESS ALLOCATION SYSTEM, PROCESS ALLOCATION METHOD, PROCESS ALLOCATION PROGRAM - Communication performance of inter-process communication in enhanced for the entire program processing. A process allocation system is provided with a processor which executes a process including a process for performing mutual inter-process communication and holding a logical process placement system, and a process allocation module for allocating each process to the processor, wherein the process allocation module is provided with an inter-processor communication capacity acquisition module for acquiring the communication performance of inter-processor communication which the processor performs with other different processor, a module for specifying the dimensional direction in which the communication traffic of inter-process communication is high in the logical process placement system, and a module for determining a processor having a higher communication performance of inter-processor communication as the allocation destination of a process which is set in the dimensional direction of higher inter-process communication traffic. | 2011-12-08 |
20110302591 | SYSTEM AND METHOD FOR DATA SYNCHRONIZATION FOR A COMPUTER ARCHITECTURE FOR BROADBAND NETWORKS - A computer architecture and programming model for high speed processing over broadband networks are provided. The architecture employs a consistent modular structure, a common computing module and uniform software cells. The common computing module includes a control processor, a plurality of processing units, a plurality of local memories from which the processing units process programs, a direct memory access controller and a shared main memory. A synchronized system and method for the coordinated reading and writing of data to and from the shared main memory by the processing units also are provided. A processing system for processing computer tasks is also provided. A first processor is of a first processor type and a number of second processors are of a second processor type. One of the second processors manages process scheduling of computing tasks by providing tasks to at least one of the first and second processors. | 2011-12-08 |
20110302592 | CONDITION BASED DETECTION OF NO PROGRESS STATE OF AN APPLICATION - A method, system, and computer usable program product for condition based detection of a no progress state of an application are provided in the illustrative embodiments. A resource usage and an output of a set of applications including the application are monitored. The resource usage and the output are measured to determine a resource usage value and an output value at a first time. A present condition is detected under which the set of applications is executing. A determination is made whether the resource usage value is included in a sub-range of a resource usage scale and the output value is included in a sub-range of an output scale where the sub-range of the resource usage scale corresponds to the sub-range of the output scale for the present condition. The no progress state of the application is detected if the determination is negative. | 2011-12-08 |
20110302593 | Processing An Asynchronous Message Event - A technique includes capturing an event associated with communication of an asynchronous message due to execution of an application instance. The technique includes processing the message event on a processor-based machine, which includes selectively routing data indicative of the event to an analyzer to determine a latency of the communication based on an affiliation of the message. | 2011-12-08 |
20110302594 | ACCELERATED CLASS CHECK - Determining a class of an object is disclosed. A pointer of the object is obtained. One or more bits that are not implemented as address bits are extracted from the pointer. The one or more bits are interpreted as an identifier of the class of the object. The class of the object is determined to correspond to the identifier. | 2011-12-08 |
20110302595 | Workspace CD Holder - A workspace CD organizer. The organizer includes an elongated strip supporting base with a bent around the middle, and a spindle vertically perpendicularly mounted on the supporting base for holding multiple CDs. The base strip has sufficient thickness to avoid a CD from touching other surface and being scratched. | 2011-12-08 |
20110302596 | METHOD AND SYSTEM FOR TRUSTED RATINGS FOR CONTENT CONSUMPTION VIA A BROADBAND GATEWAY - Aspects of a method and system for trusted ratings for content consumption via a broadband gateway are provided. A first broadband gateway may collect information regarding users of a first one or more electronic devices and information regarding content handled by the first broadband gateway. The first broadband gateway may utilize the collected information to generate ratings for content. The ratings may be customized for one or more users of the first electronic device(s). The first broadband gateway may be operable to restrict, promote, or otherwise govern access to content based on the generated ratings. The ratings may be generated based on criteria input by users of the first electronic device(s). The first electronic device(s) may be coupled to the first gateway. The first broadband gateway may also collect information from users of a second one or more electronic device(s) which may be coupled to a second broadband gateway. | 2011-12-08 |
20110302597 | DIGITAL VIDEO SIGNATURE APPARATUS AND METHODS FOR USE WITH VIDEO PROGRAM IDENTIFICATION SYSTEMS - Digital video signature apparatus and methods for use with video program identification systems are disclosed. The example apparatus and methods generate a signature associated with a video program. An example system includes a frame scanner to scan video frames associated with the video program. The frame scanner is to select a video frame based on a number of intra-coded macro blocks within the video frame. The example system also includes an intra-coded macro block extractor to extract intra-coded macro blocks from the video frame and a scaled image extractor to extract a scaled image from the intra-coded macro blocks. A signature generator is also included in the example system to calculate a plurality of centroids associated with video frame based on the scaled image and to form the signature based on the plurality of centroids. | 2011-12-08 |
20110302598 | METHOD AND SYSTEM FOR CONTENT FILTERING IN A BROADBAND GATEWAY - Aspects of a method and system for content filtering in a broadband gateway are provided. In this regard, a broadband gateway may be operable to determine whether to allow access to content based on attributes of the content and based on one or more of: which of a plurality of electronic devices is attempting to access the content, sensor information identifying a user attempting to access the content, and a time at which a user is attempting to access the information. Attributes of the content may be determined by analyzing the content utilizing one or more pattern recognition techniques. The gateway may be operable to allow a first subset of the electronic devices to access the content during a first period of time, and allow a second subset of the electronic devices to access the content during a second period of time. | 2011-12-08 |
20110302599 | TV-Centric Actions in Triggered Declarative Objects - A method according to certain implementations involves receiving by pre-delivery a triggered declarative object (TDO) at a digital television receiver device that carries out a programmed routine when user activated; the TDO including a scripted control object that when activated by the viewer implements a television-centric action; receiving a signal as a result of view activation of the scripted control object; and executing the scripted control object upon receipt of the signal. This abstract is not to be considered limiting, since other embodiments may deviate from the features described in this abstract. | 2011-12-08 |
20110302600 | Multicast Video Advertisement Insertion Using Routing Protocols - First video material is transmitted from a video source, over a video content network, to consumer premises equipment, via a hub router. The video source has a source address and there is a first path length between the hub router and the video source. Upon occurrence of a first triggering condition, a short route metric is announced from a supplemental video material server coupled to the hub router. The short route metric causes the hub router to perceive a second path length, between the hub router and the supplemental video material server, as shorter than the first path length. The supplemental video material server has a source address identical to the source address of the video source. Thus, the consumer premises equipment obtains supplemental video material from the supplemental video material server instead of first video material from the video source. Aspects of a system and a supplemental video material server are also disclosed. | 2011-12-08 |
20110302601 | Methods and systems for online advertising - A portal webpage or other entry content is provided that includes a selectable region of content. A video-rich icon is enabled. The video-rich icon may encourage a user to select the selectable region of the content. An indication of selection to the selectable region of content is received. Destination content is provided and may include an additional selectable region of content. An additional video-rich icon is enabled on the provided destination content. The additional video-rich icon may encourage a user to select the additional selectable region of content. | 2011-12-08 |
20110302602 | BROADCAST RECEIVING DEVICE AND BROADCAST RECEIVING SYSTEM - A broadcast receiving device includes: a display control unit for causing a display unit to display a video based on received data; an input unit, through which information input operation is performed; a first network communication unit communicably connected to a wide area network; a second network communication unit communicably connected to an information processing device; a network bridge processing unit for creating a bridge connection between the first network communication unit and the second network communication unit to make possible communication between the information processing device and the wide area network; and a user interface providing unit for receiving graphical user interface generated by the information processing device via the second network communication unit and supplying graphics data based on the graphical user interface to the display control unit, the user interface providing unit supplying information inputted from the input unit to the information processing device via the second network communication unit. | 2011-12-08 |
20110302603 | CONTENT OUTPUT SYSTEM, CONTENT OUTPUT METHOD, PROGRAM, TERMINAL DEVICE, AND OUTPUT DEVICE - A content output system has a terminal device which includes an input unit accepting an input of a selection of content performed by a user, a determination unit determining whether the content selected in accordance with the input to the input unit performed by the user is predetermined content, and a content-information transmission unit transmitting content information which is information on the content to an output device when the determination unit determines that the content is the predetermined content, and the output device which includes a content-information reception unit receiving the content information transmitted from the content-information transmission unit, a content-reception unit receiving the content corresponding to the content information, and an output unit outputting the content received by the content-reception unit. | 2011-12-08 |
20110302604 | METHODS AND ARRANGEMENTS FOR SYSTEM PROVIDING MEDIA VIA MULTICAST DISTRIBUTION - The present invention relates to a server and a method for achieving a fast channel change in e.g. an IPTV system. This is achieved by selecting a source for retrieving the requested channel based on the current load of the FCC server. The source may be the streaming server providing the regular multicast stream or a buffer providing a buffered version of the requested channel. According to one embodiment requests for fast channel change (relating to the same channel) are grouped and served and served as a bundle over multicast. By doing that one can alleviate the load on the FCC server and the network since multiple clients can share the same stream. | 2011-12-08 |
20110302605 | METHOD AND APPARATUS FOR SEAMLESSLY SWITCHING RECEPTION BETWEEN MULTIMEDIA STREAMS IN A WIRELESS COMMUNICATION SYSTEM - Techniques to seamlessly switch reception between multimedia programs are described. For “continued decoding”, a wireless device continues to receive, decode, decompress, and (optionally) display a current program until overhead information needed to decode the new program is received. For “early decoding”, the wireless device receives a user input and identifies a program with potential for user selection. The wireless device initiates decoding of the identified program, prior to its selection, so that the program can be decompressed and displayed earlier if it is subsequently selected. For time-compensated transmission, a base station transmits video and audio for a program in a manner to account for the difference between audio processing delay and video processing delay at the wireless device. This allows the wireless device to present the audio earlier during a program change, since its processing delay is shorter, and thus provide a faster response to the program change. | 2011-12-08 |
20110302606 | AGGREGATED TUNER SCHEDULING - A television recording system in which multiple client devices can form a group, sharing tuners and channel lineups. The clients may be desktop or laptop computers, digital video recorders or other set top boxes. A device within the group may act as a master, maintaining a master recording schedule and assigning tuners to record programs when scheduled or when a client requests use of a tuner for display live programming. Clients may register with the master, revealing the capabilities of their tuners. The master may, each time a tuner is desired, select an appropriate tuner based on multiple criteria, including bandwidth considerations and capabilities of the tuner. | 2011-12-08 |
20110302607 | HOSPITALITY MEDIA SYSTEM OPERATED BY MOBILE DEVICE - A hospitality media system includes a media system controller and a plurality of controllable devices operable by the media system controller, each of a plurality of rooms having one or more in-room controllable devices. A communication module performs data communications with a mobile device. An authentication module receives identification information from the mobile device, determines a registered room currently associated with the identification information, and includes in an authorized subset of the controllable devices for which the mobile device is authorized to operate at least the in-room controllable devices of the registered room. The media system controller operates the authorized subset of the controllable devices in dependence upon commands received from the mobile device. | 2011-12-08 |
20110302608 | INTERACTIVE TELEVISION PROGRAM GUIDE SYSTEM WITH PAY PROGRAM PACKAGE PROMOTION - A system is provided that allows a user to select a pay program for purchase from a program guide. The program guide determines whether the selected program is part of a package of pay programs. If the selected program is part of a package, information regarding the package is provided to the user so that the user may decide whether to purchase the package. If the selected program is part of several packages, information for all packages is provided. The system automatically sets reminders for packages containing repetitive programming. The system monitors whether the user has watched any of the programs in such packages. When the user watches a program from the package, the remaining reminders are cancelled. If a user does not watch any programs in a package of any type, purchase of the package is cancelled and the user is provided with the opportunity to reschedule. | 2011-12-08 |
20110302609 | ENTERTAINMENT SYSTEM AND METHOD OF COMMUNICATION - An entertainment system comprises a receiver operable to receive broadcast programmes and electronic programme guide data, a display generator operable to generate an image for display, a user interface generator operable to use received electronic programme guide data to generate an electronic programme guide indicating one or more programmes on a broadcast schedule, for display as some or all of the image, a user input operable to receive an input indicating a programme selected by a user from the electronic programme guide, and a network communicator operable to communicate with one or more remote entertainment systems over a network. The entertainment system is arranged to obtain information based upon the electronic programme guide data corresponding to the user's selected programme, and the communicator is arranged to transmit a message comprising the obtained information to one or more remote entertainment systems, thereby indicating to each remote system the user's selected programme. | 2011-12-08 |
20110302610 | UTILIZING AN ELECTRONIC PROGRAM GUIDE (EPG) FOR CUSTOMIZED CONTENT SERVICE IN A GATEWAY - A broadband gateway, which that enables communication with a plurality of devices, handles at least one physical layer connection to at least one corresponding network access service provider. The broadband gateway may identify EPG information from service providers. The identified EPG information may be adapted to device attributes such as display resolution, and/or user profiles to generate user-specific EPG information for the corresponding devices. The generated user-specific EPG information may be dynamically configured in response to updates in the identified EPG information, the device attributes and/or the user profiles. The configured user-specific EPG information may be communicated to the corresponding devices, either upon the requests from the devices or by initiation of the broadband gateway, for content selection and/or content scheduling. Advertising content, selected based on analysis of the user behavior and/or the user feedbacks, may be communicated in the user-specific EPG information to the devices to support behavioral marketing. | 2011-12-08 |
20110302611 | Scripted Interactivity for Non-Real-Time Services - A method consistent with certain implementations involves receiving a triggered declarative object (TDO) at a digital television receiver device, the TDO including a scripted executable routine; the scripted executable routine having a script that defines a user interface (UI) for manipulation of non-real-time (NRT) content; initiating the operation of the TDO; and the digital television receiver, executing scripted operations to present the user with the user interface. This abstract is not to be considered limiting, since other embodiments may deviate from the features described in this abstract. | 2011-12-08 |
20110302612 | Method and System for Providing Channel Changes Via a Gateway - A broadband gateway, which enables communication with a plurality of devices and handles at least one physical layer connection to at least one corresponding network access service provider, may be operable to receive one or more programs in preview formats from one or more program sources. Each of the one or more programs may be specified in a list. The programs specified in the list may be from different program sources. The broadband gateway may process the received one or more programs in the preview formats for presentation to one or more of the plurality of devices. The processed one or more programs in the preview formats may be communicated by the broadband gateway to the one or more of the plurality of devices, via a programming guide, for program preview by one or more users during program selections from the list. | 2011-12-08 |
20110302613 | SYSTEM AND METHOD TO CROP, SEARCH AND SHOP OBJECT SEEN ON A MOTION PICTURE - (EN) An interactive system and method to crop, search and shop object seen over an electronic media is provided. The system comprising, an electronic display media ( | 2011-12-08 |
20110302614 | INTERACTIVE PRODUCT / SERVICE LISTING - A computing device receives selection of television content from a device associated with a user, and collects metadata associated with the selected television content. The computing device also collects information associated with commercials associated with the television content, and determines an interactive product/service listing based on the collected metadata and commercial information. The device further provides the interactive product/service listing to the device for display to the user. | 2011-12-08 |
20110302615 | WIRELESS MESSAGING SYSTEMS AND METHODS - A messaging system for selectively performing an action on information, for remote retrieval of messages, for performing action on information at different times, for selective paging, for providing a user interface for message access and having integrated audio visual messaging. | 2011-12-08 |
20110302616 | VISIBLE LIGHT COMMUNICATION APPARATUS FOR IN-FLIGHT ENTERTAINMENT SYSTEM IN AIRCRAFT CABIN - The invention provides a visible light communication apparatus for in-flight entertainment system in an aircraft cabin in which a visible light communication (VLC) system is used for wireless communication of various contents data for in-flight entertainment. The invention provides a visible light communication apparatus for in-flight entertainment system in an aircraft cabin comprising an illuminating apparatus for illuminating the aircraft cabin via light emitted from an OLED element | 2011-12-08 |
20110302617 | ON-DEMAND SESSION INITIATION AND MANAGEMENT - Methods and systems to provide and manage on-demand sessions are described herein. A request is received from a client to start an on-demand session. It is determined if there are sufficient resources to start the on-demand session for the client. The request is inserted into a queue if there aren't sufficient resources to start the on-demand session for the client. The on-demand sessions is started when there are sufficient resources available and it is the client's turn in the queue. | 2011-12-08 |
20110302618 | FRAGMENTED FILE STRUCTURE FOR LIVE MEDIA STREAM DELIVERY - Media files such as MPEG-4 files are fragmented to allow for media and live media creation and delivery. A MPEG-4 standard description box includes synchronization information, end of file information, and chapter information to provide signaling information for near live playback of fragments. Playback can begin upon receiving a first MPEG-4 file fragment. A second MPEG-4 file fragment can be requested using information included in the first MPEG-4 file fragment. | 2011-12-08 |
20110302619 | BACKUP AND RESTORE OF NETWORK CONFIGURATION DATA USING A REMOTE CONTROLLER DEVICE - Presented here is a method of operating video services receivers in a network that includes a controller device and at least one member device. Also presented is a controller device that facilitates the method. The method obtains network configuration data at a first video services receiver, where the network configuration data is utilized by the first video services receiver to support data communication with the controller device and the at least one member device. The method continues by establishing a data communication link between the first video services receiver and the controller device, and uploading the network configuration data from the first video services receiver to the controller device via the data communication link. The controller device can thereafter be used to download the network configuration data to a second video services receiver. | 2011-12-08 |
20110302620 | MEDIA PROCESSING SYSTEM SUPPORTING ADAPTIVE DIGITAL MEDIA PARAMETERS BASED ON END-USER VIEWING CAPABILITIES - Systems and methods that adapt media content are described. In one embodiment, a system may include, for example, a first communications device and a second communications device. The first communications device may be disposed in a first location and may be operatively coupled to a network. The second communications device may be disposed in a second location and may be operatively coupled to the network. The second communications device may receive a device profile relating to the first communications device, adapt media content based upon the device profile of the first communications device, and send the adapted media content to the first communications device. | 2011-12-08 |
20110302621 | BROADCAST CONTROL SYSTEM - Provided is a very usable and flexible broadcast control system that can use content thatdoes not present in a set-top box by having a plurality of communication means, and can be easily operated by a user by using a paper controller printed with a dot pattern and a scanner remote controller. The broadcast control system is provided with a dot code reading device which has at least two communication means and optically reads the dot pattern formed on a medium, a first relay device for receiving the communication signal from the first communication means and controlling the broadcast receiver, and a second relay device for receiving the communication signal from the second communication means and transmitting to a server through a network. | 2011-12-08 |
20110302622 | ENTERPRISE MODEL FOR PROVISIONING FINE-GRAINED ACCESS CONTROL - Access control rules can be defined for target applications of an enterprise system independent of a runtime of the target applications. The access control rules can then normalized into decision tables. These decision tables can then be used to reconcile authorization information with the target applications via user provisioning. This process can enable comprehensive reporting and analysis of enterprise access control rules without requiring direct integration of the target applications at runtime. | 2011-12-08 |
20110302623 | APPLICATION AND OPEN SOURCE INFORMATION TECHNOLOGY POLICY FILTER - The present invention is directed to a software distribution architecture in which an enterprise has a filter that screens user requested software, software upgrade(s), software feature(s), and/or software setting option(s) against enterprise rules or policies. Disapproved software, software upgrade(s), software feature(s), and/or software setting option(s) are blocked for download. | 2011-12-08 |
20110302624 | METHOD AND SYSTEM FOR SECURE CONTENT DISTRIBUTION BY A BROADBAND GATEWAY - A broadband gateway, which enables communication with a plurality of devices, handles at least one physical layer connection to at least one corresponding network access service provider. Security boundaries such as conditional access (CA) and/or digital right management (DRM) boundaries associated with the broadband gateway are identified based on security profiles associated with the plurality of devices and/or a service from networks. The identified security boundaries are utilized to determine or negotiate CA information for content access for the service. The received content may be distributed according to the determined CA information and the security profiles of the corresponding devices. The broadband gateway may be automatically and dynamically configured based on the identified security boundaries to secure content distribution to the devices. Content distribution security schemes, for example, super encryption, simul-crypt, IPSec and/or watermarking, may be selected by matching the CA information with corresponding device security profiles. | 2011-12-08 |
20110302625 | System and Method for Managing and Controlling Data - A system for managing and controlling data. The system includes provisions for easily and rapidly updating and managing a computer system, particularly a complex computer system in which several computers communicate with one another. The system also includes a central database which plays a key role in the management and control of the computer system. Most of the management functions are retained in the central database and remote offices, which generally do not retain data management information, communicate with the central office to retrieve data management information. The system also includes a novel approach to manipulating data. | 2011-12-08 |
20110302626 | LATENCY BASED PLATFORM COORDINATION - In some embodiments, an electronic apparatus comprises at least one processor, a plurality of components, and a policy engine comprising logic to receive latency data from one or more components in the electronic device, compute a minimum latency tolerance value from the latency data, and determine a power management policy from the minimum latency tolerance value. | 2011-12-08 |
20110302627 | USER AUTHENTICATON - A method of authenticating access to a service comprises: a) receiving at a mobile terminal, over a bi-directional near-field communication channel between the mobile terminal and a browser, at least part of the identifier of a service; b) comparing, at the mobile terminal, at least part of the identifier received at the mobile terminal with a set of identifiers stored in the mobile device; and c) authenticating access to the service on the basis of whether at least part of the identifier received at the mobile terminal matches an identifier in the set. The mobile terminal may stored a set of URLs, and may compare a received URL (or part URL) with the set of stored URLs. It may generate an alert to the user if at least part of the URL received at the mobile terminal does not match a stored URL. User names and keys are not required to be stored on the web-browser, so the web-browser does not need to maintain a password database. This improves security, since a password database would be vulnerable to malicious code. | 2011-12-08 |
20110302628 | METHOD AND APPARATUS FOR PREVENTING AND ANALYZING NETWORK INTRUSION - Aspects of the disclosure provide a method for preventing and analyzing network intrusion. The method includes receiving by a network device an initial communication from an entity, determining the entity is not trusted based on the initial communication, and transmitting signals to the entity that are indicative of first disinformation of the network device to hide real information of the network device. | 2011-12-08 |
20110302629 | Systems And Methods For Secure Network Interoperability and Management - The invention relates to an interoperability system that provides increased security and data tracking to security intensive applications, such as transportation systems that currently utilize a large number of independent devices and related systems. | 2011-12-08 |
20110302630 | IDENTITY MANAGEMENT VIA CLOUD - A system and method of maintaining a user profile for a handheld computer in a shared, scalable computing resource is described. The method includes receiving user profile data from the handheld computer at the shared, scalable computing resource, the user profile data comprising a user security factor. The user profile data is received via a secure wireless communication protocol having authentication of an identity of the handheld computer. The method includes storing the user profile data on the shared, scalable computing resource as a portion of a user profile, the user profile further comprising user preference data. The method further includes receiving the user security factor from a second computing device. The user security factor is received via a secure wireless communication protocol having authentication of an identity of the second computing device. The method further includes downloading user preference data to the second computing device. | 2011-12-08 |
20110302631 | SYSTEMS AND METHODS FOR LOGGING INTO AN APPLICATION ON A SECOND DOMAIN FROM A FIRST DOMAIN IN A MULTI-TENANT DATABASE SYSTEM ENVIRONMENT - A system and method for logging into an application across separate domains in a multi-tenant database environment is provided. The method may include receiving, by a server associated with a first domain, a substitute user request from a user of the first domain, the substitute user request including a request for the user of the first domain to become a user on a second domain, posting, to a server associated with the second domain, the substitute user request, and posting, by the server associated with the second domain, a new session identification allowing the user of the first domain to login to an application on the second domain. | 2011-12-08 |
20110302632 | Method and System for Supporting Visitor Access Via a Broadband Gateway - A method and system are provided in which a broadband gateway may enable a guest or visitor to access content available to the broadband gateway. The content may be received by the broadband gateway through one or more of a plurality of network access service providers that may provide separate physical layer access to the broadband gateway. After a visitor's device is connected to the broadband gateway, the broadband gateway may classify the device. Based on the classification, the device may be authorized to access a portion of the content received. Once the authorization process is complete, the appropriate content may be made available and transferred to the device. The authorization process may include the authentication of a device identifier and/or a user identifier. The authorized access may be time-limited, but may be renewed or enabled when a request is received within a determined period of time. | 2011-12-08 |
20110302633 | Safe Internet Browser - The present invention provides a computer program product for implementing supervision functions for Internet browsing. The computer program product including a plurality of computer executable instructions stored on a computer readable medium. Wherein, the instructions when executed by a computer having a graphical user interface cause the computer to perform the steps of initiating a custom browser on the computer. The custom browser communicates with a centralized database of authorized content. The authorized content has one or more pictograms associated to the authorized content. The one or more pictograms are displayed on the graphical user interface of the computer. Authorized content is downloaded from the Internet onto the graphical user interface of the computer in response to the activation of the one or more pictograms. | 2011-12-08 |
20110302634 | PROVIDING SECURE COMMUNICATION AND/OR SHARING OF PERSONAL DATA VIA A BROADBAND GATEWAY - A broadband gateway may manage confidential data associated with users in a home network managed and/or serviced by the broadband gateway. The broadband gateway may store the user confidential data broadband gateway in a distributed manner, wherein the confidential data may be divided into a plurality of portions and stored separately in multiple storage locations or devices. When users authorize the transfer of the confidential data, all portions may be communicated to enable aggregating them such that the confidential data may be obtained. The user confidential data may be encrypted. The broadband gateway may securely communicate and/or share the user confidential user data. This may be achieved by tracking communication of the user confidential data, by using tags incorporated into the data. The broadband gateway may also ensure that communicated confidential data is rendered unusable under certain conditions, based on use for various timing tags for example. | 2011-12-08 |
20110302635 | ENHANCING SECURITY IN A WIRELESS NETWORK - A method of enhancing security in a wireless mesh communication network operating in a process control environment and including a plurality of wireless network devices includes processing a join request from a wireless device wishing to join the wireless mesh communication network, providing a limited network functionality to the wireless device if the join request is granted, requesting a complete approval of the wireless device; and granting a full network functionality to the wireless device if the complete approval of the wireless device is received. | 2011-12-08 |
20110302636 | Method of Providing a Digital Asset for Distribution - Digital assets are distributed within an electronic network. An index of digital assets available for distribution over the electronic network is provided, where each digital asset has a first serial number associated with a first transfer within the network. The index can include a list of one or more locations for the digital assets, terms of use, etc. A second serial number is provided for the digital asset in response to a request for a second transfer of a digital asset. The second serial number can be embedded within the asset and transferred from a host server to a client device in response to a confirmation of acceptance of the terms of use. | 2011-12-08 |
20110302637 | SOFTWARE DISTRIBUTION METHOD, INFORMATION PROCESSING APPARATUS, AND INFORMATION PROCESSING SYSTEM - A distribution server receives authentication information acquired from an IC card reader of a client PC and authenticated by an authentication server. The distribution server adds setting information on the basis of the received authentication information in an installer of a device driver for an image formation section of an MFP to thereby generate a custom installer of the device driver. The distribution server distributes the generated custom installer to an address of a user to be authenticated based on the authentication information. | 2011-12-08 |
20110302638 | Staged Control Release In Boot Process - Integrity validation of a network device may be performed. A network device comprising a secure hardware module, may receive a root key. The secure hardware module may also receive a first code measurement. The secure hardware module may provide a first key based on the root key and the first code measurement. The secure hardware module may receive a second code measurement and provide a second key based on the first key and the second code measurement. The release of keys based on code measurements may provide authentication in stages. | 2011-12-08 |
20110302639 | SERVER APPARATUS, AND CONTROL METHOD AND COMPUTER-READABLE STORAGE MEDIUM THEREFOR - A server apparatus capable of preventing unauthorized use of services by a third party through an electronic appliance that stores information used for user authentication by the server apparatus. The server apparatus receives, from an information processing apparatus, pieces of user identification information, pieces of appliance identification information, and pieces of use permission/prohibition information representing on a per service type basis whether uses of services are permitted or prohibited, and stores them so as to be associated with one another. When determining based on use permission/prohibition information, which is associated with a combination of user identification information and appliance identification information that are accepted from an electronic appliance, that use of a service represented by service type information accepted from the electronic appliance is permitted, the server apparatus transmits screen information for use of the service to the electronic appliance. | 2011-12-08 |
20110302640 | CYBER GENE IDENTIFICATION TECHNOLOGY BASED ON ENTITY FEATURES IN CYBER SPACE - A new identification (ID) technology comprising unified and standardized object identification within Cyber Space is disclosed based upon intrinsic properties of the entity to be identified. This Cyber Gene ID (or Cyber ID) technology extracts intrinsic information from either the physical users or their cyberspace counterparts, and such information is categorized into client parameters, dynamic parameters, static parameters, cloud parameters, connection parameters and user parameters. | 2011-12-08 |
20110302641 | METHOD AND SYSTEM PROTECTING AGAINST IDENTITY THEFT OR REPLICATION ABUSE - A system detecting and protecting against identity theft by abusing a computer users ID and password or protecting a user against identity replication through parallel user session via a second authentication level using a second channel, a one-time-passcode and user contextual location information. When accessing networks, computer systems or programs, the said networks, computer systems or programs will validate user ID and password and collect contextual information about the user, the device, the used network etc. Once validated, a message is send by a second means that may be a cell phone SMS network or an instant message, said message containing a real-time session-specific one-time passcode. The session specific code and the collected information provides information enabling the user to detect a compromised identity through a mismatch between presented information and the information representing the user and the passcode protects against fraudulent access. | 2011-12-08 |
20110302642 | IMAGE FORMING APPARATUS, CONTROL METHOD THEREOF, AND STORAGE MEDIUM - In an image forming apparatus of the present invention, authentication information necessary for a user to log in to the image forming apparatus and address information of a mobile terminal are stored associated with each other, and upon receiving from a mobile terminal a search request for searching for a device with which to establish wireless communication, and the address information of the mobile terminal, it is determined, based on the address information and the stored information, whether the address information is associated with authentication information of the user that has logged in to the image forming apparatus. As a result, if it has been determined that the address information is associated with the authentication information of the user that has logged in to the image forming apparatus, information indicating that the image forming apparatus has been logged in to is transmitted as a response to the search request. | 2011-12-08 |
20110302643 | MECHANISM FOR AUTHENTICATION AND AUTHORIZATION FOR NETWORK AND SERVICE ACCESS - There is proposed a network access authentication and authorization mechanism in which an authentication session in an authentication, authorization and accounting procedure for a user equipment for providing an initial network access is executed. A first identification element related to the user equipment is obtained. Then, a user credential validation procedure is performed wherein a second identification element related to the user equipment or related to a user of the user equipment is obtained. The obtained first and second identification elements are processed for determining whether a match between the first and second identification elements exists. In addition, the authentication session executed for the user equipment is identified on the basis of the result of the processing of the first and second identification elements. Then, a change of an authorization of the user equipment is executed for providing a modified network access. | 2011-12-08 |
20110302644 | Multi-Channel Multi-Factor Authentication - Systems and methods for authenticating electronic transactions are provided. The authentication methods employ a combination of security features and communication channels. These security features can be based, for example, on unique knowledge of the person being authenticated, a unique thing that the person has, unique personal features and attributes of the person, the ability of the person to respond, and to do so in a fashion that a machine cannot, and so forth. Methods for enrolling the person prior to authentication are also provided, as well as systems for enrollment and authentication. | 2011-12-08 |
20110302645 | Multi-Channel Multi-Factor Authentication - Systems and methods for authenticating electronic transactions are provided. The authentication methods employ a combination of security features and communication channels. These security features can be based, for example, on unique knowledge of the person being authenticated, a unique thing that the person has, unique personal features and attributes of the person, the ability of the person to respond, and to do so in a fashion that a machine cannot, and so forth. Methods for enrolling the person prior to authentication are also provided, as well as systems for enrollment and authentication. | 2011-12-08 |
20110302646 | SYSTEM AND METHODS FOR ONLINE AUTHENTICATION - A method of authenticating a network client to a relying party computer via a computer server comprises the computer server receiving a transaction code from a token manager via a first communications channel. The network client is configured to communicate with a token manager which is configured to communicate with a hardware token interfaced therewith. The network client is also configured to communicate with the relying party computer and the computer server. The computer server also receives a transaction pointer from the relying party computer via a second communications channel that is distinct from the first communications channel. Preferably, the transaction pointer is unpredictable by the computer server. The computer server transmits an authorization signal to the relying party computer in accordance with a correlation between the transaction code and the transaction pointer. The authorization signal facilitates authentication of the network client to the relying party computer. | 2011-12-08 |
20110302647 | AUTOMATING NETWORK RECONFIGURATION DURING MIGRATIONS - Automating network reconfiguration such as firewall reconfiguration in migrations may include determining network reconfiguration needs in one or more network functionalities of the target environment based on the discovering; and applying the network reconfiguration needs to the one or more network functionalities in the target environment. | 2011-12-08 |
20110302648 | ANTI-MALWARE SYSTEM AND OPERATING METHOD THEREOF - Provided are an anti-malware system, and an operating method thereof. The anti-malware system matches an filtering operation on first target data to be filtered with a rule pattern, performs a filtering operation on the first target data according to a matching result, matches second target data to be malware-scanned with a malware pattern, and performs a malware scanning operation on the second target data according to a matching result, wherein the filtering operation and the scanning operation are performed on a system-on-chip (SoC). | 2011-12-08 |
20110302649 | SYSTEM FOR AND METHOD OF PROVIDING SECURE SIGN-IN ON A TOUCH SCREEN DEVICE - A system for and method of providing secure sign-in on a touch screen device that comprises an electronic device in accordance with exemplary embodiments may include receiving, from a user, password data in a first input format, determining that the password data is associated with a valid user by at least comparing the first input format of the password data to a second input format and comparing the password data to valid character element data, wherein the second input format is derived in accordance with one or more password format rules, and providing the valid user with access to one or more functions of the touch screen device. | 2011-12-08 |
20110302650 | INITIATION OF STORAGE DEVICE SCANS - Example embodiments relate to initiation of storage device scans based on a record of existing scans of the storage device. In particular, example embodiments include a mechanism that maintains a record of existing scans of the storage device including an entry for each scan initiated by one of a plurality of scanning processes. In some embodiments, the record of existing scans may then be accessed in determining whether to initiate or permit initiation of a new scan. | 2011-12-08 |
20110302651 | VERIFICATION OF A SEGMENTED PROGRAM ON A PARALLEL PROCESSING COMPUTING SYSTEM - Embodiments of the invention provide a method, apparatus, and program product to verify a program that includes a plurality of sections with a computing system that is configured to process a plurality of threads of execution. The method comprises verifying and executing a first section of the program utilizing a first thread of execution in response to activation of the program and determining a second section of the program to execute subsequent to the first section. The method further comprises verifying the second section utilizing a second thread of execution in parallel with the execution of the first section. Another embodiment of the invention provides a method of compiling program that includes program code by grouping the program code into sections based upon the execution time of the program code and based upon which program code is most commonly executed. | 2011-12-08 |
20110302652 | SYSTEM AND METHOD FOR DETECTING REAL-TIME SECURITY THREATS IN A NETWORK DATACENTER - The system and method described herein may include a configuration management database that describes every known service endpoint in a network datacenter to represent a steady state for the datacenter. One or more listeners may then observe traffic in the datacenter in real-time to detect network conversations initiating new activity in the datacenter, which may be correlated, in real-time, with the information in the configuration management database representing the steady state for the datacenter. Thus, in response to the new activity failing to correlate with the known service endpoints, a real-time security alert may be generated to indicate that any network conversations initiating such activity fall out-of-scope from the steady state for the information technology datacenter. | 2011-12-08 |
20110302653 | System and Method for Network Security Including Detection of Attacks Through Partner Websites - A computer readable storage medium has instructions for execution on a computer. The instructions monitor transactions between a server and a set of clients. An evaluation of session indicators associated with the transactions is performed. Individual sessions between the server and individual clients of the plurality of clients are isolated in response to the evaluation. | 2011-12-08 |
20110302654 | METHOD AND APPARATUS FOR ANALYZING AND DETECTING MALICIOUS SOFTWARE - A method for providing analysis and detection of malicious software may include directing a comparison of patterns within sample code to a predetermined set of malicious software patterns, determining whether the sample code is likely to be malicious software based on the comparison, and, in response to a determination that the sample code is likely to be malicious software, determining a malicious software cluster with which the sample code is associated based on the patterns within the sample code. A corresponding computer program product and apparatus are also provided. | 2011-12-08 |
20110302655 | Anti-virus application and method - A method of performing an anti-virus scan on an electronic file. An anti-virus application running at a computer device determines that an electronic file requires scanning. The electronic file is placed in a queue for analysis, and the state of the electronic file is altered such that it can be written to a memory but not accessed before analysis is complete. An icon associated with the electronic file is altered to indicate that the analysis is not yet complete, the icon being displayable on a display device. Once the electronic file has been analysed, the icon associated with the electronic file is altered again to indicate that it has been analysed. | 2011-12-08 |
20110302656 | DETECTING MALICIOUS BEHAVIOUR ON A COMPUTER NETWORK - A malicious behaviour detector ( | 2011-12-08 |
20110302657 | SECURITY COUNTERMEASURE FUNCTION EVALUATION PROGRAM - In a security countermeasure function evaluation apparatus, an estimator operates an input unit, whereby an evaluation point calculation unit makes an evaluation as to whether each item of countermeasure information representing a security countermeasure function in detail satisfies each item of sufficient condition table information, and the evaluation point is calculated from the evaluation result of each item, whereby the transition probability calculation unit calculates a transition probability based on the evaluation point. | 2011-12-08 |
20110302658 | METHOD, APPARATUS, AND SYSTEM FOR ENABLING A SECURE LOCATION-AWARE PLATFORM - A method, apparatus, and system enable a secure location-aware platform. Specifically, embodiments of the present invention may utilize a secure processing partition on the platform to determine a location of the platform and dynamically apply and/or change security controls accordingly. | 2011-12-08 |
20110302659 | DATA SECURITY IN A MULTI-NODAL ENVIRONMENT - A data security manager in a multi-nodal environment enforces processing constraints stored as security relationships that control how different pieces of a multi-nodal application (called execution units) are allowed to execute to insure data security. The security manager preferably checks the security relationships for security violations when new execution units start execution, when data moves to or from an execution unit, and when an execution unit requests external services. Where the security manager determines there is a security violation based on the security relationships, the security manager may move, delay or kill an execution unit to maintain data security. | 2011-12-08 |
20110302660 | METHOD AND APPARATUS FOR SECURING DIGITAL DEVICES WITH LOCKING CLOCK MECHANISM - A mechanism to secure a synchronous digital device such as a Mobile Device is provided. Using the clocking mechanisms of the synchronous digital designs, the invention enables mechanisms to secure Mobile devices. When a potential security breach is detected, blocking the clock will disable the Mobile Device. The invention also contemplates mechanisms to re-enable the Mobile Device when the security risk from the block condition is resolved. The invention further contemplates mechanisms to secure the enterprise information technology system from the hacked or stolen Mobile Devices. | 2011-12-08 |
20110302661 | System & Method for Distributing Digital Assets Across a Network - Digital media assets are distributed through the use of identification data. A rights-holder server is adapted to introduce a digital asset which is associated with a set of distribution rules. The digital assets are stored on host servers and a management server tracks transfers of the digital asset over the network. | 2011-12-08 |
20110302662 | CONTENT PROTECTION SYSTEM - Provided is a content protection system, in which: a user terminal judges, when a content is to be reproduced or executed, whether or not the user terminal has a usage right of the content, and makes, if it is judged that the user terminal does not have the usage right of the content, a request to a license management apparatus to acquire the usage right of the content; the license management apparatus generates, when the request to acquire the usage right is received from the user terminal, license information containing information on an expiration date that is set based on a timing when the request is received, and transmits the generated license information to the user terminal; and the user terminal judges that the user terminal has the usage right of the content until the expiration date indicated by the license information received from the license management apparatus arrives. | 2011-12-08 |
20110302663 | Method and System for Securing a Home Domain From External Threats Received by a Gateway - A method and system are provided in which a broadband gateway may handle at least one physical layer connection to at least one corresponding network access service provider. The broadband gateway may receive content comprising an application through the at least one network access service provider and may store the content in a first portion of a memory. A software agent may be utilized to request the content and/or to store the received content in the first portion of the memory. The broadband gateway may execute the application after access by the application to a second portion of the memory is disabled. After the execution of the application is completed, access to the second portion of the memory may be enabled. In some instances, the application may be verified to determine whether it is secure for utilization and/or distribution. When verification fails, the application may be deleted. | 2011-12-08 |
20110302664 | DEVICE AND METHOD FOR PROTECTING AN ELECTRONIC SYSTEM AGAINST UNAUTHORIZED ACCESS - The invention relates to an electronic system comprising a printed circuit ( | 2011-12-08 |
20110302665 | NON-HUMAN MAMMALS WITH T OR B CELLS HAVING PREDEFINED SPECIFICITY - The present invention provides non-human mammals, e.g., mice, generated from a T cell or B cell with a predefined specificity or isolated from an organism suffering from a condition of interest. In some embodiments the non-human mammals are not genetically modified. Also provided are methods of using the non-human animals. | 2011-12-08 |
20110302667 | TRANSGENIC BRASSICA EVENT MON 88302 AND METHODS OF USE THEREOF - The invention provides plants comprising transgenic event MON 88302 that exhibit tolerance to glyphosate herbicide. The invention also provides seeds, plant parts, cells, commodity products, and methods related to the event. The invention also provides DNA molecules that are unique to the event and were created by the insertion of transgenic DNA into the genome of a | 2011-12-08 |
20110302668 | Broccoli Type Having Curds with Detached Florets - The present invention includes broccoli plants with curds having detached florets and methods for obtaining such broccoli plants. The present invention also provides reagents that can be used in methods for obtaining such broccoli plants. | 2011-12-08 |
20110302669 | MAIZE VARIETY AND METHOD OF PRODUCTION - The disclosure relates to a maize plant, seed, variety, and hybrid. More specifically, the disclosure relates to a maize plant containing a Cal-1 allele, whose expression results in increased cell wall-derived glucan content in the maize plant. The disclosure also relates to crossing inbreds, varieties, and hybrids containing the Cal-1 allele to produce novel types and varieties of maize plants. | 2011-12-08 |
20110302670 | POLYNUCLEOTIDES AND METHODS FOR THE IMPROVEMENT OF PLANTS - The invention provides methods for producing a plant with altered seed yield, the methods comprising transformation of a plant with a genetic construct including a polynucleotide encoding of a polypeptide with the amino acid sequence of SEQ ID NO: 1 or a variant or fragment thereof. The method also provides isolated polypeptides, polynucleotides, constructs and vectors useful for producing a plant with altered seed yield. The method also provides plant cell and plants transformed to contain and express the polypeptides, polynucleotides and constructs. The invention also provides plants produced by methods of the invention. | 2011-12-08 |
20110302671 | EMBRYO SAC-SPECIFIC GENES - The present invention relates to isolated nucleotide sequences useful for the production of plants with a modified embryo sac, embryo and or endosperm development, and to transgenic cells and plants transformed with the nucleotide sequences. | 2011-12-08 |
20110302672 | LOWERING SATURATED FATTY ACID CONTENT OF PLANT SEEDS - Compositions and methods include genetically encoding and expressing a novel delta-9 desaturase in plant cells. In some embodiments, methods of expressing nucleic acids in a plant cell to take advantage of the delta-9 desaturase enzyme's activity, such that the percent composition of saturated fatty acids in plant seeds is decreased and there is a concomitant increase in ω-7 fatty acids. In other embodiments, amino acid sequences have delta-9 desaturase activity. Methods can involve expression of delta-9 desaturase in plant cells, plant materials, and whole plants for the purpose of increasing the amount of unusual fatty acids in whole plants, plant seeds, and plant materials, for example, seeds. | 2011-12-08 |
20110302673 | Transgenic Plants with Increased Yield - Polynucleotides are disclosed which are capable of enhancing yield of a plant transformed to contain such polynucleotides. Also provided are methods of using such polynucleotides and transgenic plants and agricultural products, including seeds, containing such polynucleotides as transgenes. | 2011-12-08 |
20110302674 | Methods and Compositions for the Improvement of Plant Tolerance to Environmental Stresses - The invention provides methods, polynucleotides and polypeptides useful for producing or selecting plants with increased tolerance to at least one environmental stress selected from drought, cold, freezing, heat and salinity. The invention also provides constructs, cells, plant cells and plants comprising the polynucleotides of the invention. The invention also provides plants produced by the methods of the invention. The invention also provides groups of plants selected by the methods of the invention. | 2011-12-08 |
20110302675 | CONTROL OF VIRAL AND BACTERIAL INFECTION BY ANTIMICROBIAL PEPTIDES RETROCYLIN AND/OR PROTEGRIN EXPRESSED IN CHLOROPLASTS - Disclosed herein are antimicrobial compositions containing one or more antimicrobial peptides having been expressed in chloroplasts. Exemplified herein are the expression and use of retrocylin and protegrin. Disclosed herein are methods of engineering chloroplasts to express such antimicrobial peptides such that they are properly processed and active. Plants containing such chloroplasts are disclosed as well. The chloroplast expressed peptides are useful to delay, prevent or treat viral and bacterial infections. | 2011-12-08 |
20110302676 | Method and Device for Examining a Sample with a Probe Microscope - The invention relates to a method for examining a sample by using probe microscopy, in particular scanning probe microscopy in which a sample is examined by way of a probe microscope with a multi-part measuring probe comprising a probe element and a guide clement guiding the probe element during the probe microscopy examination with the method furthermore comprising the following steps: capturing of noise measuring signals for the measuring probe in a non measuring configuration in which the probe clement is arranged separately from the guide element, capturing of measuring signals for the measuring probe in a measuring configuration in which the probe element is guided by the guide element, and analysing the measuring signals by at least partially assigning the measuring signals to the noise measuring signals. Further, the invention relates to a device for examining a sample with a probe microscope. | 2011-12-08 |
20110302677 | DETECTION AND CHARACTERIZATION OF LASER-INDUCED HEAT AFFECTED ZONES ON POLYMER BASED DEVICES - Detection and characterization of laser-induced heat affected zones on polymer based devices, such as polymeric stents, are described where Nano Thermal Analysis may be used with atomic force microscopy to obtain the thermal behavior of materials with a spatial resolution of under, e.g., 100 nm. Heat may be applied locally to the measured polymeric stem via a probe tip and the resulting thermal-mechanical response can be measured. | 2011-12-08 |
20110302678 | Cranberry variety named 'CNJ95-20-20' - A new cranberry variety distinguished by very early season ripening, with exceptional early and high fruit anthocyanin (TAcy), as compared to the currently cultivated commercial varieties, with high fruit quality, and very suitable for the fresh fruit market. | 2011-12-08 |
20110302679 | Mandarin tree named '950' - A new mandarin hybrid tree particularly distinguished by having dense foliation; bearing fruit that are attractive in appearance with excellent eating quality; has lateral branching with lower angle plant habit; a round tree shape; and nearly seedless fruit is disclosed. | 2011-12-08 |
20110302680 | Blackberry plant named APF-45 - Description and specifications of a new and distinct blackberry cultivar named ‘APF-45’ which originated from seed produced by a hand pollinated cross of Ark. Selection APF-1 (non-patented, unreleased genotype)×APF-12 (U.S. Plant Pat. No. 16,989) is provided. This new blackberry cultivar can be distinguished by its very firm fruit with excellent postharvest handling potential, medium-large size, attractive fruit appearance, very good flavor, excellent plant health, and cane erectness. | 2011-12-08 |
20110302681 | Dianella tasmanica plant named 'Lemon Lime' - ‘Lemon Lime’ is a distinctive variety of | 2011-12-08 |
20110302682 | SUTERA PLANT NAMED 'DANOVA886' - A new and distinct | 2011-12-08 |
20110302683 | SUTERA PLANT NAMED 'DANOVA982' - A new and distinct | 2011-12-08 |