21st week of 2009 patent applcation highlights part 71 |
Patent application number | Title | Published |
20090133078 | Systems and methods for automatically purchasing and recording popular pay programs in an interactive media delivery system - A system and method for automatically purchasing and recording popular pay program is disclosed. The pay programs are selected based on defined criteria and popularity. The most popular pay program that meets defined criteria will be automatically recorded and purchased. Notifications and confirmations are provided before purchase of pay programs. | 2009-05-21 |
20090133079 | Detecting Distribution of Multimedia Content - A system and method is disclosed for detecting distribution of multimedia content. The volume level of data traffic is monitored for a plurality of users to select any users with high-bandwidth usage. The time of day and the day of the week may be considered when determining whether a user is a high-bandwidth user. Upon selecting a user as one with high-bandwidth usage, such user may be subject to packet inspections of data traffic streams. In some embodiments, content identification parameters or watermarks are added to one or more packets in a data traffic stream carrying multimedia content. | 2009-05-21 |
20090133080 | METHODS, COMPUTER PROGRAM PRODUCTS, AND SYSTEMS FOR PACKAGING LIVECAST ELECTRONIC CONTENT FOR DISTRIBUTION - Packaging live broadcast electronic content for delivery on a content delivery network is provided. A first live program broadcast on a first channel is scheduled for delivery on a livecast channel, and a second live program broadcast on a second channel is scheduled for delivery on the livecast channel. The first live program is associated with a first content identifier and the first channel in an electronic program guide, and the second live program is associated with a second content identifier and the second channel in the electronic program guide. Upon receiving a program selection of at least one of the first live program or the second live program from the electronic program guide, the program selection is delivered over the livecast channel. | 2009-05-21 |
20090133081 | INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, COMPUTER PROGRAM, AND INFORMATION SHARING SYSTEM - An information processing apparatus that can communicate with plural content viewing apparatuses includes a group registering unit that registers users of the content viewing apparatuses in groups, a sharing-level setting unit that sets sharing level information representing an information sharing level among users belonging to an identical group, a viewing-information receiving unit that receives viewing information of the users, a user-viewing-content managing unit that manages a user viewing content database, a discriminating unit that discriminates, when a viewing information request of another user is received, the other users belonging to a group identical with a group to which the user of the content viewing apparatus at the request source belongs, an information extracting unit that extracts viewing information of the discriminated other users from the user viewing content database, and a viewing-information transmitting unit that transmits the viewing information to the content viewing apparatus at the request source. | 2009-05-21 |
20090133082 | AUDIO/VIDEO COMMUNICATION SYSTEM - An audio/video communication system includes a large number of nodes connected in a balanced binary tree structure. In constructing a group in a balanced binary tree structure, a root node performs the following process: if a left lower node connector of the root node is vacant, the root node connects a new node to the left lower node connector and increases left weight information by “1”; if the left lower node connector of the root node is occupied and if a right lower node connector of the root node is vacant, the root node connects a new node to the right lower node connector and increases right weight information by “1”; if both of the left lower node connector and the right lower node connector of the root node are occupied and if the left weight information of the root node is equal to or less than the right weight information of the root node, the root node sends a request for an addition of a new node to its left lower node and increases the left weight information by “1”; or if both of the left lower node connector and the right lower node connector of the root node are occupied and if the left weight information of the root node is greater than the right weight information of the root node, the root node sends a request for an addition of a new node to its right lower node and increases the right weight information by “1”. Accordingly, it is possible to provide an audio/video communication system that permits simultaneous communication among a large number of nodes and that performs flexible management of adding a new node to the system and removing a node from the system. | 2009-05-21 |
20090133083 | PASSIVE CIRCUIT FOR IMPROVED DIFFERENTIAL AMPLIFIER COMMON MODE REJECTION - A novel passive circuit for providing improved common mode rejection of a differential amplifier novel. The passive circuit functions to compensate for amplitude mismatches between the two outputs of a differential amplifier. To compensate for the amplitude mismatch between the output traces of the amplifier, a resistor is inserted in series with at either one or both of the differential outputs. The values of the resistors are set such that the mismatch is substantially eliminated. Inductors are connected in parallel with the resistors to create a zero ohm path for power. At high frequencies the inductor impedance is sufficiently high that the series resistor compensates for the imbalance caused by spurious products. The imbalance in the amplifier outputs is corrected with the resulting increase in the rejection of spurious frequency products by exploiting the differential common mode rejection (CMR) effect of the differential amplifier. | 2009-05-21 |
20090133084 | APPARATUS AND METHOD FOR PROVIDING VIDEO CONTENT AND SUPPLEMENTAL INFORMATION TO A CLIENT OVER A SWITCHED DIGITAL VIDEO CONTENT-BASED NETWORK - Video content is transmitted from a head end, over a switched digital video content-based network, to a client. The head end obtains a first group of program streams and sends to the client only a subset of the program streams selected by subscribers in a neighborhood of the client. The video content is contained in a given one of the subset of the program streams and the client is tuned to a channel corresponding to the given one of the subset of the streams. The supplemental information is transmitted from the head end, over the switched digital video content-based network, to the client, based upon the channel to which the client is tuned. The video content and the supplemental information can both be sent on an identical carrier frequency corresponding to the channel; they may employ an identical quadrature amplitude modulation scheme, and the video content can be broken into packets identified via a first packet identifier, with the supplemental information broken into packets identified via a second packet identifier. | 2009-05-21 |
20090133085 | Systems and Method for Determining Visual Media Information - A set top box includes a processor. The processor is configured to receive a digital video stream, calculate a hash of an I-Frame within the digital video stream, and submit the hash to a server. The processor is further configured to receive location information in response to submitting the hash to the server. | 2009-05-21 |
20090133086 | System and Method for Delivering Long-Tail Content - A system and method for delivering a long-tail content comprising a set-top box configured to couple an external signal to a user device. The long-tail content server also comprises a long-tail content server configured to provide the external signal to the set-top box from a central server. The long-tail content server further comprises a long-tail content asset manager configured to control a communication between at least one of the central server, the long-tail content server and the set-top box and at least one of the central server, the long-tail content server and the set-top box. | 2009-05-21 |
20090133087 | METHOD FOR DEVISING A COMMUNICATION PLATFORM WHICH CAN DISPLAY THE MEDIA ADVERTISEMENT AUTOMATICALLY - A method for devising a communication platform that can play the media advertisement automatically. After a computer is logged on, a user is connected to the communication platform. A network media advertisement is displayed through the reception of a network control signal by network. Or a custom media advertisement is played by a media player under a time period. After the playing of a custom media advertisement or a network media advertisement, the communication platform is connected to. A custom media advertisement or a network media advertisement is played by the above mentioned methods. | 2009-05-21 |
20090133088 | Method and system for IPTV service authentication and service quality control - Provided are a method of and system for controlling IPTV service authentication and traffic flow in an access network. The IPTV service system comprises: a subscriber concentrator which delivers an IPTV service request message that is sent from a subscriber terminal, receives an IPTV service authentication reply message generated in accordance with IGMP in response to the IPTV service request message, and sends a corresponding IPTV multicast stream to the subscriber terminal according to an IPTV service authentication result; a network connector which receives the IPTV service request message delivered from the subscriber concentrator, generates an IPTV service authentication request message in accordance with a RADIUS protocol, sends the generated IPTV service authentication request message to an IPTV service authentication/billing server, generates an IPTV service authentication reply message in accordance with the IGMP when receiving an IPTV service authentication reply message generated in accordance with the RADIUS protocol, and sends the generated IPTV service authentication reply message to the subscriber concentrator; and the IPTV service authentication/billing server which determines whether the subscriber is authorized for an IPTV service when receiving the IPTV service authentication request message that is generated in accordance with the RADIUS protocol and sent from the network connector, and generates the IPTV service authentication reply message in accordance with the RADIUS protocol and sends the IPTV service authentication reply message to the network connector. Accordingly, resources of the access network can be used effectively. | 2009-05-21 |
20090133089 | System and Methods for Advanced Parental Control - A set top box includes a processor. The processor is configured to receive a digital video stream and identify an I-Frame within the digital video stream. The processor is further configured to receive rating information for the I-Frame and to block playback a portion of the digital video stream in response to the rating information. | 2009-05-21 |
20090133090 | METHOD AND SYSTEM OF PROVIDING CONTENT MANAGEMENT FOR A SET-TOP BOX - An approach is provided for establishing, by a first user (e.g., parent), a user profile on a set-top box that is configured to present a selectable image corresponding to the user profile to a display for selection by a second user (e.g., child). The user profile specifies content that is available to the second user. | 2009-05-21 |
20090133091 | WIRELESS COMMUNICATIONS DEVICE AND INTEGRATED CIRCUITS WITH DIGITAL TELEVISION RECEIVER AND METHODS FOR USE THEREWITH - An integrated circuit includes a digital television receiver section that receives a digital television signal. A wireless telephone transceiver section generates an outbound RF signal from an outbound symbol stream and converts an inbound RF signal into an inbound symbol stream. A processing module converts outbound data into the outbound symbol stream and converts the inbound symbol stream into inbound data. The digital television receiver and the wireless telephone receive section can share at least one common receiver component. An optional GPS receiver can also share at least one common receiver component and can generate GPS data that can be used when executing a digital television application. | 2009-05-21 |
20090133092 | Methods and Apparatus for Filtering Content in a Video Stream Using Text Data - Various embodiments of apparatus and/or methods are described for skipping and/or filtering content from a video stream using text data associated with the video stream. The text data is parsed using metadata to identify portions of the video stream to skip during presentation, and/or to identify portions of the video stream to present to a user. The portions of the video stream that are to be skipped are filtered from the video stream, and the filtered video stream is presented to a user. | 2009-05-21 |
20090133093 | Methods and Apparatus for Generating Metadata Utilized to Filter Content from a Video Stream Using Text Data - Various embodiments of apparatus, systems and/or methods are described for generating metadata utilized by a DVR to filter content from a video stream. A video stream is reviewed to identify portions the video stream to skip during presentation of the video stream. Text data associated with the video stream is parsed to identify a string in the text data that identifies boundaries of the portions of the video stream that are to be skipped during presentation by the DVR. The string is provided to the DVR, and the DVR utilizes the string to skip the portion of the video stream during presentation of the video stream by the DVR. | 2009-05-21 |
20090133094 | METHODS AND COMPUTER PROGRAM PRODUCTS FOR SUBCONTENT TAGGING AND PLAYBACK - A content provider inserts at least one begin tag and at least one end tag into a broadcast program. The at least one begin tag and at least one end tag defines a video clip segment for the broadcast program. The content provider transmits the broadcast program including the at least one begin tag and the at least one end tag over a network to a digital video recorder (DVR). Upon the broadcast program ending, the content provider transmits a wrapper over the network to the DVR. The wrapper includes wrapper information comprising at least one of a sponsor advertisement, a trailer broadcast, a header broadcast, or a summary of one or more video clip segments. | 2009-05-21 |
20090133095 | Addressable Tap Units for Cable Television Networks and Related Methods of Remotely Controlling Bandwidth Allocation in Such Networks - Addressable tap units for a cable television network include a radio frequency input and a radio frequency output. These tap units may further include a radio frequency receiver that is configured to receive a radio frequency signal input at the radio frequency input. A filter circuit, which may be a plug-in filter circuit, is coupled between the radio frequency input and the radio frequency output. The filter circuit includes at least one filter that filters out signals in one or more frequency bands. The tap units also may include a plurality of switches that select one of a plurality of signal paths through the filter circuit. The plurality of switches may be controlled in response to data contained in the radio frequency signal. The tap unit may also include an alternate radio frequency path that bypasses the plug-in filter module so that signals incident at the radio frequency input traverse the alternate radio frequency path if the plug-in filter module is not installed in the addressable tap unit. | 2009-05-21 |
20090133096 | MICRO AND MACRO TRUST IN A DECENTRALIZED ENVIRONMENT - A method and system are disclosed. In one embodiment the method includes calculating a trust level of a first entity. The first entity has a plurality of components. Each component in the first entity has at least the trust level of the first entity. | 2009-05-21 |
20090133097 | Device, system, and method for provisioning trusted platform module policies to a virtual machine monitor - A method, apparatus and system for a trusted platform module accepting a customized integrity policy provisioned to a virtual machine monitor, verifying the security of a first policy object, for example, including the customized integrity policy, by comparing a counter associated with the first policy object with a counter associated with a second policy object, and customizing a virtual trusted platform module of the virtual machine monitor according to the first policy object, for example, when the first policy object is verified. The customized integrity policy may include user specified configurations for implementing a customized virtual environment. Other embodiments are described and claimed. | 2009-05-21 |
20090133098 | SERVICE MANAGEMENT SYSTEM AND METHOD OF EXECUTING A POLICY - A service management system and a method of executing a policy. In one embodiment, the service management system includes: (1) a repository configured to contain device, system, subscriber and service descriptions that define services in terms of a set of systems and devices that assume roles based on at least one of capabilities and attributes thereof and (2) a policy engine coupled to the repository and configured to employ the repository to identify end points relevant to a policy, identify services in which any of the end points play a role, identify subscribers having an identified device of the end points and a subscription to an identified service and cause the policy to be executed with respect to identified devices of identified subscribers and identified systems. | 2009-05-21 |
20090133099 | METHODS AND SYSTEMS FOR TRANSPARENT SOFTWARE LICENSE SUSPENSION - Methods and systems for license sharing in a computing system that include receiving a request for a license being currently used by a process in execution, pausing the execution of the process, and releasing the license to a shared pool. | 2009-05-21 |
20090133100 | ACCESS CONTROL ON DYNAMICALLY INSTANTIATED PORTAL APPLICATIONS - The present invention relates to a method and system for controlling access rights to dynamically instantiated portal applications in a portal environment, wherein new instances of a portal application and respective access control information on resources used in the application are generated dynamically from an automated programmed mechanism, and wherein a user-application role mapping is demanded for the portal application by a respective runtime access control function implemented at the portal environment. The method includes: assigning an individual user-to-application role mapping to a respective individual one of the created instances of the portal application, wherein for each incoming user request to one of the created instances the runtime access control function checks a target application instance identifier, which identifies an individual application instance desired to be addressed by the incoming request; and granting access rights to incoming user requests according to the application roles as they are defined for the target application instance. | 2009-05-21 |
20090133101 | SECURE FILE TRANSFER METHOD - An on-board telecommunication system, partitioned into a secure area and a non secure area, including at least a first telecommunication equipment unit in the secure area, a second telecommunication equipment unit in the non secure area, and a first one-way link from the first to the second equipment. The first equipment unit is configured to transmit data on the first link according to a first protocol. The system further includes a second link from the second to the first equipment unit, in accordance with a second protocol, the first two layers of which are distinct of those of the first protocol, the second equipment configured to transmit data on the second link as messages in accordance with the first protocol and encapsulated in frames in accordance with the second protocol. | 2009-05-21 |
20090133102 | Optimized security association database management on home/foreign agent - Techniques for security association management on a home agent and a foreign agent are described herein. In one embodiment, in response to a first mobile network registration request from a mobile node, a remote authentication facility is accessed to retrieve a security association for the mobile node for authenticating and providing a first network connectivity to the mobile node, wherein the security association is associated with a lifespan. The security association is inserted in a local security association database to create a security association entry, wherein the security association entry includes the lifespan. A second mobile network registration request from the mobile node after the first network connectivity has been terminated is received and the security association entry in the local security association database that corresponds to the mobile node is used to provide authentication of the mobile node without having to access the remote authentication facility again if the lifespan associated with the security association entry is valid. Other methods and apparatuses are also described. | 2009-05-21 |
20090133103 | Method and system for data security in an IMS network - A method and system to enhance the protection of the data in an user equipment and secure real time streaming of the data in the user equipment is disclosed. The method and system includes sending request by at least one user to access at least one application server. The user is provisioned to download a appropriate CMSC and a mapper into the user equipment from the application server. The method and system further comprises user sending request via an IMS network to download a data to the user equipment. The data is encrypted in the application server and is downloaded into the user equipment. The mapper identifies the appropriate CMSC, which may decrypt the data. Further, the data undergoes double decryption in real time within the user equipment before being presented in user interface. The double decryption is provisioned using the valid CMSC downloaded in the user equipment. | 2009-05-21 |
20090133104 | Device Access Based on Centralized Authentication - Access control to a networked peripheral device by a walk-up user, wherein the networked peripheral device is accessible by both the walk-up user and a remote user, based on centralized access management information. Access control comprises receiving authenticated information for the walk-up user from the networked peripheral device at a centralized location, determining at the networked peripheral device a level of access to the networked peripheral device by the walk-up user based on received access management information for the walk-up user, and allowing the walk-up user to access the determined user-available features of the networked peripheral device based on the determined level of access. | 2009-05-21 |
20090133105 | MULTI-MEDIUM WIDE AREA COMMUNICATION NETWORK - A communication network including a primary network, and an auxiliary network. The primary network includes wireless stations each able to transmit and receive data over the primary network, and bridge stations able to transmit and receive data both over the primary network and over the auxiliary network. The auxiliary network includes auxiliary stations and bridge stations each able to transmit and receive data over the auxiliary network. At each bridge station, the activity of other stations on both the primary network and the auxiliary network is monitored to establish the availability of intermediate stations for onward transmission of message data from an originating station to a destination station. Message data is transmitted from the originating station to the destination station via at least one opportunistically selected intermediate station, including at least one bridge station. | 2009-05-21 |
20090133106 | Authentication Frequency And Challenge Type Based On Environmental And Physiological Properties - An apparatus and method are disclosed for determining authentication frequency (i.e., the length of time between authenticating and re-authenticating a user) and challenge type (e.g., username/password, fingerprint recognition, voice recognition, etc.) based on one or more environmental properties (e.g., ambient noise level, ambient luminosity, temperature, etc.), or one or more physiological properties of a user (e.g., heart rate, blood pressure, etc.), or both. Advantageously, the illustrative embodiment enables authentication frequency and challenge type to be adjusted based on the likelihood of malicious activity, as inferred from these properties. In addition, the illustrative embodiment enables the authentication challenge type to be tailored to particular environmental conditions (e.g., noisy environments, dark environments, etc.). | 2009-05-21 |
20090133107 | Method and device of enabling a user of an internet application access to protected information - A method and a system are disclosed, of enabling a user of an Internet application to access protected information. An idea behind at least one embodiment of the invention is that a user identifier token is created, after a user has been authenticated by way of a logon mechanism of the Internet application. The user identifier token is then associated with the authenticated user and stored at an Internet client of the authenticated user. When protected information is to be made available for a requesting user, the concerned set of protected information is associated with the authenticated user and an information identifier token is created and associated with the protected information. The information identifier token is delivered to the authenticated user via e-mail. When a request is received from a requesting user, it is verified that the request comprises a user identifier token and an information identifier token, that there exists an association between these tokens and the previously authenticated user and the protected information, respectively, and that the requested protected information is associated with the authenticated user. If so, the requesting user is allowed to access the protected information. | 2009-05-21 |
20090133108 | SYSTEMS FOR SECURE AUTHENTICATION FOR NETWORK ACCESS - Systems and methods for authenticating the identity of a user over a network. The user must supply a removable physical medium such as CD, DVD, or memory stick that contains security information about the user and the user's account as well as a user identification and password. This information is verified before the user is allowed to access the account. | 2009-05-21 |
20090133109 | METHOD AND APPARATUS FOR ACCESSING A NETWORK - According to one embodiment of the present invention, there is provided a method of authorising a computing device to access a network, comprising receiving authentication data including a user identifier from the computing device, determining whether approval to verify the authentication data is given, and where it is so determined, authorising the device to access the network upon verification of the authentication data. | 2009-05-21 |
20090133110 | SYSTEM AND METHOD USING GLOBALLY UNIQUE IDENTITIES - Systems and methods are described for creating a globally unique identity for a user or user-container by performing an iterative join where each participating back-end data source. The systems and methods include an ID-Unify (IDU) that performs identity virtualization and creates or generates a globally unique identifier for a user in operational environments in which there is a pre-existing conflict caused by the existence of different identities for a user in different authentication data sources. | 2009-05-21 |
20090133111 | SYSTEM FOR CENTRALIZING PERSONAL IDENTIFICATION VERIFICATION AND ACCESS CONTROL - A computerized centralized access management system having an access card with personal identification information, a server in communication an access control computer having an access card reader, an add-on computer program stored in the access control computer to perform a method of reading the access card, retrieving personal identification information, transmitting personal information to the server, receiving an access record and notifying the access control computer whether or not to allow access for the individual according to said access record received from said server. | 2009-05-21 |
20090133112 | USE OF DATA LINKS FOR AERONAUTICAL PURPOSES WITHOUT COMPROMISING SAFETY AND SECURITY - A method of ensuring secure and cost effective communication of aeronautical data to and from an aircraft is provided. The method includes uplinking air-ground aircraft data communications via an aeronautical safety data link and downlinking air-ground aircraft data communications via a consumer data link separated from the aeronautical safety data link by a one-way firewall. | 2009-05-21 |
20090133113 | ADDING CLIENT AUTHENTICATION TO NETWORKED COMMUNICATIONS - A pass-through agent receives a request from a client and authenticates the client before forwarding the request to a target server that lacks client authentication capability. The target server is configured to accept requests from the pass-through agent, and may be configured to reject requests that do not come from the pass-through agent. | 2009-05-21 |
20090133114 | METHOD FOR IMPLEMENTING AN INTERNET PROTOCOL (IP) CHARGING AND RATING MIDDLEWARE PLATFORM AND GATEWAY SYSTEM - A method for Internet Protocol (IP) charging and rating gateway within a system having: (i) a proxy server for connection to an Authentication, Authorization, and Accounting (AAA) server; (ii) an access gateway, (iii) an IP classification engine for connection between a data network and the access gateway; and (iv) a gateway controller connected to the proxy server and the IP classification engine, including the steps of: (a) receiving IP packets at the IP classification engine, the IP packets originating from the data network and destined for a subscriber device via the access gateway; (b) classifying the IP packets according to the protocol of each of the packets at the IP classification engine; and (c) selectively instructing the IP classification engine to permit or deny the flow of IP packets between the data network and the access gateway at the gateway controller. Preferably, the proxy server is configured to emulate the access gateway and the AAA server. | 2009-05-21 |
20090133115 | VPN Management - A client attempts to transmit a presence state to a presence server that is behind a firewall of a secure network. If the client is inside the firewall, the presence server instructs resources within the secure network to directly communicate with the client. However, if the client is outside the firewall, then the client must tunnel into the secure network via a Virtual Private Network (VPN) before accessing the resources in the secure network. | 2009-05-21 |
20090133116 | Time Information Management System - A rights validator system for controlling access to content, the system including a query processor to receive a rights query and to provide a result to the rights query based on an estimated time, and a time-based query response module operationally connected to the query processor, the time-based query response module being operative to determine the estimated time as a function of a most recently updated time, and a plurality of indications of elapsed time since the most recently updated time, the indications of elapsed time being from a plurality of different sources of time indication. Related apparatus and methods are also included. | 2009-05-21 |
20090133117 | Authentication Frequency And Challenge Type Based On Application Usage - An apparatus and method are disclosed for determining authentication frequency (i.e., the length of time between authenticating and re-authenticating a user) and challenge type (e.g., username/password, fingerprint recognition, voice recognition, etc.) based on what software applications a user is running on a data-processing system, and how those applications are being used (e.g., what functions are used, what data is input to or output by the application, how often and for how long applications are used, what input devices and output devices are used, etc.) Advantageously, the illustrative embodiment enables authentication frequency and challenge type to be adjusted based on the likelihood of malicious activity and/or the potential cost of malicious activity, as inferred from current and past application usage. In addition, the illustrative embodiment enables selection of an authentication challenge type that is less intrusive to a user based on current application usage. | 2009-05-21 |
20090133118 | METHODS AND SYSTEMS FOR AUTOMATED AUTHENTICATION, PROCESSING AND ISSUANCE OF DIGITAL CERTIFICATES - A computer system and process for issuing digital certificates use domain-control vetting to issue certificates. A requestor requests a certificate from a certificate authority, which identifies at least one approver to approve issuance of the digital certificate. If approved, the certificate authority accepts the request, creates and signs the certificate, and the signed certificate is sent to the requester. | 2009-05-21 |
20090133119 | MASTER DEVICE AND DATA PROCESSING SYSTEM - A certification result obtained by a master device | 2009-05-21 |
20090133120 | PREVENTING TRIVIAL CHARACTER COMBINATIONS - Methods, systems, and products for preventing the selection of trivial character combinations in passwords. Methods may include maintaining a database of trivial patterns representing sequences on the keyboard and independent from the starting point of the sequence. When a new password is proposed a check is done to verify if the pattern of the new password matches with an existing “forbidden” pattern and in such case it is refused by the system. Any number and kind of trivial patterns may be forbidden. The security administrator may choose patterns which should not be permitted. | 2009-05-21 |
20090133121 | Method for processing messages and message processing device - A message processing device for processing messages has at least one reception buffer, a message includes at least one authentication element and one message content. The message is received and stored in the reception buffer. A characteristic variable of a priority for security checking of the message is determined as a function of the message content. A processing sequence for further message processing for the security checking, taking into account the at least one authentication element of the messages in the reception buffer is defined and carried out as a function of the characteristic variable. | 2009-05-21 |
20090133122 | METHOD AND SYSTEM FOR DETECTING SUSPICIOUS FRAME IN WIRELESS SENSOR NETWORK - A method and system for detecting a suspicious frame in a wireless sensor network that includes: a plurality of sensor nodes, for sending sensed data and data regarding an upper-level node and cluster head node. A data collecting node receives data from the sensor nodes, sends information, and extracts data received from the sensor nodes. A first probability of occurrence of the routing path is computed with respect to training frames, and a second probability of occurrence of a source routing path is computed using the first probability. The second probability is compared with a reference value, and displays an indication notifying an abnormality of the source node according to when the second probability and the reference value. | 2009-05-21 |
20090133123 | Worm Propagation Modeling In A Mobile AD-HOC Network - A worm propagation modeling system for use with a mobile ad-hoc network (MANET) includes an infection detection module receiving temporal dynamics information relating to temporal dynamics of worm spread in the MANET and spatial dynamics information relating to spatiality of nodes in the MANET. The infection detection module detects infection in a network segment of the MANET based on the temporal dynamics information and the spatial dynamics information. | 2009-05-21 |
20090133124 | A METHOD FOR DETECTING THE OPERATION BEHAVIOR OF THE PROGRAM AND A METHOD FOR DETECTING AND CLEARING THE VIRUS PROGRAM - A method for detecting the operation behavior of the program includes: obtaining the destructive operation behavior of the known virus program; setting the corresponding control and process program according to the destructive operation behavior; making the control and process program get the control right of destructive operation behavior; the destructive operation behavior of the program to be detected calling the corresponding control and process program, the corresponding control and process program recording the operation behavior of the said program to be detected. The method can also return the success response information by the control and process program, so as to induce the program to be detected to perform the next behavior, but the program to be detected don't perform in practicality. That is, the present invention can provide a virtual environment for the program to be detected in order to record a series behavior of it. A method for clearing the virus program setup and perform the adverse behavior operation of the program based on the behavior of the virus program to realize the recovery of the demolished data by the virus. | 2009-05-21 |
20090133125 | METHOD AND APPARATUS FOR MALWARE DETECTION - The present invention relates to an apparatus and method for detecting malware. The malware detection apparatus and method of the present invention determines whether a file is malware or not by analyzing the header of an executable file. Since the malware detection apparatus and method can quickly detect presence of malware, it can shorten detection time considerably. The malware detection apparatus and method can also detect even unknown malware as well as known malware to thereby estimate and determine presence of malware. Therefore, it is possible to cope with malware in advance, protect a system with a program, and increase security level remarkably. | 2009-05-21 |
20090133126 | APPARATUS AND METHOD FOR DETECTING DLL INSERTED BY MALICIOUS CODE - Provided are an apparatus and method for detecting a Dynamic Link Library (DLL) inserted by a malicious code. The method includes collecting first DLL information from an image file of a process before the process is executed; collecting second DLL information loaded into a memory as the process is executed; comparing the first DLL information with the second DLL information to extract information on an explicit DLL; and determining whether the explicit DLL is a DLL inserted by a malicious code or not. | 2009-05-21 |
20090133127 | DATA COMMUNICATION APPARATUS, METHOD OF CONTROLLING THE SAME, PROGRAM, AND STORAGE MEDIUM - A data communication apparatus that permits the use of a communication function in an appropriate manner even before a license for the communication function is made valid. A CPU of a printing apparatus as the data communication apparatus determines whether or not a trial transmission license is valid. If it is determined that the license is not valid, the CPU performs inhibits execution of processing associated with the transmission function, and restricts processing to be performed on data received using the reception function without inhibiting execution of processing associated with the reception function. | 2009-05-21 |
20090133128 | IMAGE PROCESSING APPARATUS AND REINSTALLATION METHOD THEREFOR - An image processing apparatus includes an installation unit configured to install an application for image processing and license information regarding the application, an information setting unit configured to set, as threshold information, operation restriction information, which is included in the license information, regarding the application, a counting unit configured to count operation information regarding an operation of the application, an application operation restriction unit configured to restrict an operation of the application according to the threshold information and the counted operation information, a reinstallation unit configured to reinstall the application, and an information setting control unit configured to inhibit the information setting unit from setting, as the threshold information, the operation restriction information, which is included in the license information, regarding the application reinstalled by the reinstallation unit. | 2009-05-21 |
20090133129 | DATA TRANSFERRING METHOD - A method of transferring data is provided. The method of transferring data in a data interoperable environment includes: receiving a data transmission request message for requesting the data to be transmitted from a client to at least one destination; gathering information on entities which are to participate in the transmission of the data; and forming a plurality of chains including at least two entities based on the gathered information on the entities and transmitting the data to the at least one destination through the plurality of chains. Accordingly, it is possible to effectively transmit data using multi-chains in a DRM interoperable environment. | 2009-05-21 |
20090133130 | Media editing system using digital rights management metadata to limit import, editing and export operations performed on temporal media - A computer system for editing temporal media, such as audio, video, audiovisual works and the like, limits the editing operations that can be performed on the temporal media according to the digital rights management metadata associated with the temporal media. The digital rights management metadata may be, for example, rules associated with the temporal media which describe how the temporal media can be imported into the editing system, manipulated by the editing system and/or exported by the editing system. | 2009-05-21 |
20090133131 | METHOD AND SYSTEM FOR MANAGING SOFTWARE LICENSES - A method and system for managing licenses over a network is disclosed. The method and system include establishing a user account on a server coupled to the network, and allowing a user or publisher to upload or download licenses from a computer to or from the server. The licenses are then associated with the user account, and the user is allowed to log into the user account to review the account and associated uploaded licenses. The method and system further include allowing the user to review and retrieve the licenses for download to the user computer in the case of a lost or damaged license. | 2009-05-21 |
20090133132 | Secure Authoring and Execution of User-Entered Database Programming - A secure framework for authoring and execution of user-entered database scripts, rules, procedures and other forms of programming is provided. A performance management application is used as an interface between a client data modeling, manipulation or analysis application and one or more data sources or analysis services to prevent malicious or inadvertent implementation of harmful, damaging and/or unauthorized new or modified scripts, rules, procedures or other forms of programming to one or more data sources or data analysis/manipulation services that may be used for retrieving, storing, modifying or using data contained in or affected by the one or more data sources or data analysis/manipulation services. | 2009-05-21 |
20090133133 | Transgenic Mice for Bioassay of Prions from Deer and Elk with Chronic Wasting Disease - The invention relates to the use of transgenic constructs to produce animal models for the study of chronic wasting disease. | 2009-05-21 |
20090133134 | METHOD AND COMPOSITION FOR GENETICALLY MODIFYING NON-HUMAN CELLS AND ANIMALS - The present invention is directed to a vector and its use to generate genetically modified animals and cells. One aspect of this invention involves a vector that comprises a sperm cell and one or more polynucleotide molecules bound to a sperm cell through one or more sperm antibody linker. The sperm cell can be any animal sperm cell, preferably non-human animal such as a mouse, pig, sheep, goat, or chicken. In one preferred embodiment of this invention, the one or more polynucleotide molecules encode for a gene product that confers desired characteristics in the cells or the animals. In another preferred embodiment of this invention, the genetically modified cells are able to produce desired therapeutic proteins. The association of the sperm, linker, and the one or more polynucleotide can also occur in vitro or in vivo. In another embodiment, the genetically modified cells are transgenic chicken eggs in which one or more desired recombinant protein is expressed. | 2009-05-21 |
20090133135 | Diagnostic and Therapeutic Target SLC39A11 Proteins for Neurodegenerative Diseases - The present invention discloses a dysregulation of the SLC39A12 gene and the protein products thereof in Alzheimer's disease patients. Based on this finding, the invention provides methods for diagnosing and prognosticating Alzheimer's disease in a subject, and for determining whether a subject is at increased risk of developing Alzheimer's disease. Furthermore, this invention provides therapeutic and prophylactic methods for treating and preventing Alzheimer's disease and related neurodegenerative disorders using the SLC39A12 gene and its corresponding gene products. Screening methods for modulating agents of neurodegenerative diseases are also disclosed. | 2009-05-21 |
20090133136 | Inducible SIRNA expression cassette and method of use - An inducible siRNA expression polynucleotide and methods for its use are provided. The expression polynucleotide comprises a bicistronic expression cassette that encodes a repressor and a detectable marker, wherein the repressor controls expression of siRNA expression in the absence of an inducer. | 2009-05-21 |
20090133137 | Method of cloning animals - The present invention relates to cloning technologies. The invention relates in part to immortalized and totipotent cells useful for cloning animals, the embryos produced from these cells using nuclear transfer techniques, animals that arise from these cells and embryos, and materials, methods, and processes for establishing such cells, embryos, and animals. | 2009-05-21 |
20090133138 | NEW GENE FRAGMENT, NOVEL TRANSGENIC ZEBRAFISH AND METHODS FOR PRODUCING TRANSGENIC ZEBRAFISH - The present invention provides a method for producing systemic red fluorescent zebrafish. The present invention also provides a new gene fragment and a systemic red fluorescent zebrafish. | 2009-05-21 |
20090133139 | NUCLEOTIDE SEQUENCE OF SHRIMP ACTIN PROMOTER AND ITS USE IN GENETIC TRANSFORMATION BIOTECHNOLOGY - The present invention relates to an isolated β-actin nucleic acid promoter molecule from shrimp; nucleic acid constructs including the β-actin promoter molecule; and expression vectors, host cells, and transgenic animals transduced with the isolated β-actin nucleic acid promoter. Also disclosed are methods for imparting to an animal resistance against a pathogen, regulating growth of an animal, increasing stress tolerance in an animal, and increasing cold tolerance in an animal that involves transforming an animal with a nucleic acid construct including the isolated β-actin nucleic acid promoter molecule of the present invention. | 2009-05-21 |
20090133140 | Injecting Drosophila Embryos - The present invention provides systems that allow reliable multiplexed transformation of | 2009-05-21 |
20090133141 | ENHANCED POLLENIZER AND METHOD FOR INCREASING SEEDLESS WATERMELON YIELD - An enhanced, diploid pollenizer watermelon plant and method used to maximize the yield of triploid seedless watermelons per area. The enhanced pollenizer watermelon plant of the invention is either a hybrid variety, an open-pollinated variety or a synthetic variety, that exhibits the characteristics of small leaves and fruit with a brittle rind that splits when the fruit is overripe or breaks when relatively small physical forces are applied. In one embodiment, the watermelon plant of the invention is also characterized by extended flowering duration, thereby increasing the number of triploid watermelon flowers that are pollinated and set fruit. The method for producing a seedless watermelon fruit, includes the steps of providing a pollenizer diploid watermelon plant, extending the duration of flowering of the pollenizer plant while reducing the number of such plants needed to pollinate the same number of triploid watermelon plants, and maximizing dispersal of the pollenizer watermelon plant throughout the field of triploid watermelon plants. | 2009-05-21 |
20090133142 | COTTON VARIETY 04T042 - The invention relates to the novel cotton variety designated 04T042. Provided by the invention are the seeds, plants, plant parts and derivatives of the cotton variety 04T042. Also provided by the invention are tissue cultures of the cotton variety 04T042 and the plants regenerated therefrom. Still further provided by the invention are methods for producing cotton plants by crossing the cotton variety 04T042 with itself or another cotton variety and plants produced by such methods. | 2009-05-21 |
20090133143 | COTTON VARIETY 04T056 - The invention relates to the novel cotton variety designated 04T056. Provided by the invention are the seeds, plants, plant parts and derivatives of the cotton variety 04T056. Also provided by the invention are tissue cultures of the cotton variety 04T056 and the plants regenerated therefrom. Still further provided by the invention are methods for producing cotton plants by crossing the cotton variety 04T056 with itself or another cotton variety and plants produced by such methods. | 2009-05-21 |
20090133144 | COTTON VARIETY 04T067 - The invention relates to the novel cotton variety designated 04T067. Provided by the invention are the seeds, plants, plant parts and derivatives of the cotton variety 04T067. Also provided by the invention are tissue cultures of the cotton variety 04T067 and the plants regenerated therefrom. Still further provided by the invention are methods for producing cotton plants by crossing the cotton variety 04T067 with itself or another cotton variety and plants produced by such methods. | 2009-05-21 |
20090133145 | COTTON VARIETY 05T103 - The invention relates to the novel cotton variety designated 05T103. Provided by the invention are the seeds, plants, plant parts and derivatives of the cotton variety 05T103. Also provided by the invention are tissue cultures of the cotton variety 05T103 and the plants regenerated therefrom. Still further provided by the invention are methods for producing cotton plants by crossing the cotton variety 05T103 with itself or another cotton variety and plants produced by such methods. | 2009-05-21 |
20090133146 | COTTON VARIETY 04P011 - The invention relates to the novel cotton variety designated 04P011. Provided by the invention are the seeds, plants, plant parts and derivatives of the cotton variety 04P011. Also provided by the invention are tissue cultures of the cotton variety 04P011 and the plants regenerated therefrom. Still further provided by the invention are methods for producing cotton plants by crossing the cotton variety 04P011 with itself or another cotton variety and plants produced by such methods. | 2009-05-21 |
20090133147 | COTTON VARIETY 04P024 - The invention relates to the novel cotton variety designated 04P024. Provided by the invention are the seeds, plants, plant parts and derivatives of the cotton variety 04P024. Also provided by the invention are tissue cultures of the cotton variety 04P024 and the plants regenerated therefrom. Still further provided by the invention are methods for producing cotton plants by crossing the cotton variety 04P024 with itself or another cotton variety and plants produced by such methods. | 2009-05-21 |
20090133148 | COTTON VARIETY 02Z89 - The invention relates to the novel cotton variety designated 02Z89. Provided by the invention are the seeds, plants, plant parts and derivatives of the cotton variety 02Z89. Also provided by the invention are tissue cultures of the cotton variety 02Z89 and the plants regenerated therefrom. Still further provided by the invention are methods for producing cotton plants by crossing the cotton variety 02Z89 with itself or another cotton variety and plants produced by such methods. | 2009-05-21 |
20090133149 | COTTON VARIETY 04Z007 - The invention relates to the novel cotton variety designated 04Z007. Provided by the invention are the seeds, plants, plant parts and derivatives of the cotton variety 04Z007. Also provided by the invention are tissue cultures of the cotton variety 04Z007 and the plants regenerated therefrom. Still further provided by the invention are methods for producing cotton plants by crossing the cotton variety 04Z007 with itself or another cotton variety and plants produced by such methods. | 2009-05-21 |
20090133150 | COTTON VARIETY 04Z353 - The invention relates to the novel cotton variety designated 04Z353. Provided by the invention are the seeds, plants, plant parts and derivatives of the cotton variety 04Z353. Also provided by the invention are tissue cultures of the cotton variety 04Z353 and the plants regenerated therefrom. Still further provided by the invention are methods for producing cotton plants by crossing the cotton variety 04Z353 with itself or another cotton variety and plants produced by such methods. | 2009-05-21 |
20090133151 | Flower Pigmentation in Pelargonium hortorum - The present invention relates to novel | 2009-05-21 |
20090133152 | METHODS FOR ALTERING THE GENOME OF A MONOCOT PLANT CELL - Methods and compositions for altering the genome of a monocot plant cell, and a monocot plant are disclosed. The methods and compositions use a double-strand break inducing agent to alter a monocot plant or plant cell genomic sequence comprising a recognition sequence for the double-strand break inducing agent. | 2009-05-21 |
20090133153 | Polypeptide participating in pyridoxine biosynthesis, polynucleotide encoding the polypetide and those uses - The present invention discloses a polypeptide participating in pyridoxine biosynthesis, a polynucleotide coding the polypeptide and those uses. Particularly, this present invention discloses a polypeptide participating in pyridoxine biosynthesis, a polynucleotide coding the polypeptide, a method for inducing plant growth inhibition, a method for screening a compound inducing plant growth inhibition, and composition for inducing plant growth inhibition which comprises the compound obtained by the screening method. | 2009-05-21 |
20090133154 | ABIOTIC STRESS TOLERANT TRANSGENIC PLANTS - In a transgenic plant, a stress-responsive promoter containing CE3 and ABRE2 from HVA1 ABRC3 and CE1 from HVA22 ABRC1, directs low background expression of a gene under normal growth conditions, but is highly inducible by an abiotic stress, such as abscisic acid, dehydration, salt or cold. Compared with the wild type plant, the transgenic plant that expresses a stress-resistant gene under the control of the stress-responsive promoter is more resistant and/or tolerant to abiotic stresses and exhibits similar or higher growth rate and strength under regular or normal environmental conditions. | 2009-05-21 |
20090133155 | Modification of Flavonoid Biosynthesis in Plants - The present invention relates to nucleic acids encoding flavonoid biosynthetic enzymes, flavonoid-regulating transcription factors and a flavonoid-specific membrane transporter in plants, and the use thereof for the modification of flavonoid biosynthesis in plants. The present invention also relates to constructs and vectors including such nucleic acids, and related polypeptides. More particularly, the protein involved in flavonoid biosynthesis is selected from the group consisting of TRANSPARENT TESTA 12 (TT12), TRANSPARENT TESTA GLABRA 1 (TTG1), TRANSPARENT TESTA 2 (TT2), TRANSPARENT TESTA 8 (TT8), leucoanthocyanidin dioxygenase (LDOX), cinnamate-4-hydroxylase (C4H), 4-coumaroyl:CoA-ligase (4CL); and functionally active fragments and variants thereof. | 2009-05-21 |
20090133156 | NUCLEOTIDE SEQUENCES AND POLYPEPTIDES ENCODED THEREBY USEFUL FOR MODIFYING PLANT CHARACTERISTICS AND PHENOTYPES - Isolated polynucleotides and polypeptides encoded thereby are described, together with the use of those products for making transgenic plants. | 2009-05-21 |
20090133157 | METHOD OF PRODUCING FRUIT OF CAPSICUM PLANT WITH VITAMIN C CONTENT INCREASED - The object of the present invention is to provide a method of producing a fruit of a | 2009-05-21 |
20090133158 | BS3 RESISTANCE GENE AND METHODS OF USE - Isolated nucleic acid molecules that confer resistance to the plant pathogen | 2009-05-21 |
20090133159 | SOYBEAN EF1A2 PROMOTER AND ITS USE IN CONSTITUTIVE EXPRESSION OF TRANSGENIC GENES IN PLANTS - The promoter of a soybean translation elongation factor EF1 alpha and fragments thereof and their use in promoting the expression of one or more heterologous nucleic acid fragments in a tissue-independent or constitutive manner in plants are described. | 2009-05-21 |
20090133160 | Polyoleosins - The present invention relates to constructs including one or more nucleic acids encoding two or more oleosin repeat units, and methods of use thereof. The present invention also relates to recombinant polypeptides including two or more oleosin repeat units, and methods of use thereof. | 2009-05-21 |
20090133161 | Maize Ethylene Signaling Genes and Modulation of Same for Improved Stress Tolerance in Plants - The invention provides isolated maize EIN3, ERF3, EBF1, EBF2, EIN5 nucleic acids which are associated with ethylene signaling in plants and their encoded proteins. The present invention provides methods and compositions relating to altering ethylene sensitivity in plants. The invention further provides recombinant expression cassettes, host cells, transgenic plants and antibody compositions. | 2009-05-21 |
20090133162 | Method of increasing plant organ and seed size in a plant - The present invention provides methods and DNA molecules useful for producing transgenic plants with agronomically desired traits based on altered sizes of plant organs and tissues. | 2009-05-21 |
20090133163 | PROMOTER, PROMOTER CONTROL ELEMENTS, AND COMBINATIONS, AND USES THEREOF - The present invention is directed to promoter sequences and promoter control elements, polynucleotide constructs comprising the promoters and control elements, and methods of identifying the promoters, control elements, or fragments thereof. The invention further relates to the use of the present promoters or promoter control elements to modulate transcript levels. | 2009-05-21 |
20090133164 | EG1117 polynucleotides and uses thereof - The present invention provides methods for identifying polynucleotide and polypeptide sequences which may be associated with commercially or aesthetically relevant traits in domesticated plants or animals. The methods employ comparison of homologous genes from the domesticated organism and its ancestor to identify evolutionarily significant changes and evolutionarily neutral changes. Sequences thus identified may be useful in enhancing commercially or aesthetically desirable traits in domesticated organisms or their wild ancestors. | 2009-05-21 |
20090133165 | SEED DEVITALIZATION METHOD - The present invention relates to a method for devitalizing seeds that provides a non-viable (i.e., non-germinating) seed exhibiting substantially the same protein and/or deoxyribonucleic acid (DNA) characteristics as a viable seed and also relates to devitalized seeds produced by the method. | 2009-05-21 |
20090133166 | Methods for Improving Flowering Characteristics Using Methyl Dihydrojasmonate - Methods and formulations for improving the flowering characteristics of plants, such as rose plants, are disclosed. The formulations include methyl dihydrojasmonate: | 2009-05-21 |
20090133167 | METHOD FOR OBTAINING A SCANNING TRANSMISSION IMAGE OF A SAMPLE IN A PARTICLE-OPTICAL APPARATUS - A method for improving the resolution of STEM images of thick samples. In STEM, the diameter of the cross-over depends on the opening half-angle α of the beam and can be as low as 0.1 nm. For optimum resolution an opening half-angle is chosen at which the diameter of the cross-over R(α) shows a minimum. For thick samples the resolution is, for those parts of the sample removed from the cross-over plane, limited by the convergence of the beam, resulting in a diameter D of the beam at the surface of the sample. The opening angle is chosen to balance the contribution of convergence and of diameter of the cross-over by choosing an opening half-angle smaller than the optimum opening half-angle. Effectively the sample is then scanned with a beam that has a substantially constant diameter over the length of the sample material through which the electrons have to travel. | 2009-05-21 |
20090133168 | SCANNING PROBE MICROSCOPE - A scanning probe microscope is provided, which can be stably used for a long time even if excitation efficiency varies during scan. A cantilever ( | 2009-05-21 |
20090133169 | Independently-addressable, self-correcting inking for cantilever arrays - An improved method of loading tips and other surfaces with patterning compositions or inks for use in deposition. A method of patterning is described, the method comprising: (i) providing at least one array of tips; (ii) providing a plurality of patterning compositions; (iii) ink jet printing at least some of the patterning compositions onto some of the tips; and (iv) depositing at least some of the patterning compositions onto a substrate surface; wherein the ink jet printing is adapted to prevent substantial cross-contamination of the patterning composition on the tips. Good printing reproducibility and control of printing rate can be achieved. The surfaces subjected to ink jet printing can be treated to encourage localization of the ink at the tip. The method is particularly important for high density arrays. | 2009-05-21 |
20090133170 | Optical Instruments Having Dynamic Focus - An optical system suitable for use in an optical instrument such as a handheld optical probe, the optical system including a scanning element and an objective, the objective including a variable focus lens that can be electronically controlled to change the focal length of the optical system. In some embodiments, the optical system can axially and laterally scan a subject material by sequentially focusing at an axial depth using the variable focus lens and laterally scanning the material at that depth using the scanning element. | 2009-05-21 |
20090133171 | Tapered probe structures and fabrication - Probe structures and fabrication techniques are described. The described probe structures can be used as probes for various applications such as conductance measurement probes, field emitter probes, nanofabrication probes, and magnetic bit writing or reading probes. | 2009-05-21 |
20090133172 | Mandarin named 'Valley Gold' - A new variety of mandarin ( | 2009-05-21 |
20090133173 | STRAWBERRY PLANT NAMED 'PRESTIGE' - This invention relates to a new and distinct variety of strawberry plant named ‘PRESTIGE’. This new strawberry plant named ‘PRESTIGE’ is primarily adapted to the growing conditions of the central coast of California, and is primarily characterized by its medium to large plant size; medium fruit size; spreading calyx segments; long petiolule length; three to four leaflets/tri-foliate; moderate fruit production with very good flavor; and medium green foliage with medium glossy texture and medium interveinal blistering. | 2009-05-21 |
20090133174 | Elaeagnus plant named 'viveleg' - A new and distinct highly ornamental | 2009-05-21 |
20090133175 | VARIETY OF CORDYLINE PLANT NAME 'RIC01' - A new and distinct cultivar of | 2009-05-21 |
20090133176 | PHLOX PLANT NAMED 'PINA COLADA' | 2009-05-21 |
20090133177 | PENSTEMON PLANT NAMED 'PENHARVIO' | 2009-05-21 |