01st week of 2012 patent applcation highlights part 58 |
Patent application number | Title | Published |
20120005708 | Media User Interfaces Using Metadata from Different Sources - A navigation interface display system generates a navigation element that organizes television programming data in an easy-to-use manner. The navigation element employs a hierarchical display protocol for a plurality of selection items that represent the various television programs, channels, and/or networks. The hierarchical display scheme displays a limited number of active selection items at a first magnification level and additional active selection items at a second magnification level. In addition, the selection items are displayed on distinctive areas or features of the navigation element, where such features represent different content genres or categories. Subcategories can also be displayed in a hierarchical manner, thus providing additional information related to the content as the magnification level of the navigation element changes. | 2012-01-05 |
20120005709 | APPARATUS AND METHOD FOR PROVIDING ELECTRONIC PROGRAM GUIDES - A system that incorporates teachings of the present disclosure may include, for example, a server having a controller to provide a media processor with a description of available channels, receive from the media processor a request for EPG data and a selection of channels from the available channels where the selection of channels is based on a user's input at the media processor in response to a presentation of the description of the available channels at a display device operably connected to the media processor, and provide to the media processor the requested EPG data representing programming for the selection of channels without programming for remaining channels from the available channels that were not selected, where the media processor presents an EPG based on the provided EPG data, and where a portion of the EPG data is obtained by the controller from a first service provider network that is different from a second service provider network in which the server operates. Other embodiments are disclosed. | 2012-01-05 |
20120005710 | Program Search Apparatus and Program Search Method - According to one embodiment, a program search apparatus includes a communication module, a search module, and an output controller. The communication module is configured to communicate with an external apparatus via a network. The search module is configured to search for a corresponding program corresponding to a designated program designated from a program table via the network. The output controller is configured to execute control to output a search result. | 2012-01-05 |
20120005711 | DIFFERENTIATED PSIP TABLE UPDATE INTERVAL TECHNOLOGY - An apparatus, method and data structure for generating at least one table in a broadcast environment, are provided. The apparatus includes a generator to generate an event information table (EIT) and an extended text table (ETT). The ETT has program guide information for an n-hour span and has a transmission interval. The ETT has a transmission interval and program description information according to the EIT. The transmission interval of the EIT is shorter than the transmission interval of the ETT. | 2012-01-05 |
20120005712 | METHOD FOR SETTING RESERVATION IN BROADCAST RECEIVER - A method for setting reservation in a broadcast receiver is disclosed. In one embodiment, reservation information supposed to be applied to a second broadcast receiver for carrying out reserved playing or recording of a broadcast program is generated by a first broadcast receiver and the generated reservation information is transmitted through a network; the reservation information can comprise an identifier of a broadcast program for reserved playing or recording. The reservation information can be transmitted directly to the second broadcast receiver or transmitted to the second broadcast receiver through a server related to broadcast receivers. Before generating the reservation information, broadcast channel information which can be received by the second broadcast receiver can be received from the server and based on the received broadcast channel information, the reservation information can be generated. Therefore, the user can remotely set reservation information about a broadcast program in a different broadcast receiver. | 2012-01-05 |
20120005713 | METHODS, SYSTEMS, AND COMPUTER PROGRAM PRODUCTS FOR CONFIGURING ACCESS TO A DATA SOURCE BASED ON A CHANNEL IDENTIFIER - Methods and systems are described for configuring access to a data source based on a channel identifier. First channel information identifying a first channel is received. The first channel identifier is bound to a frequency channel accessible via a tuner. First access information is received for accessing a first data source not accessible via the tuner. A binding between the first channel identifier and the first channel access information is created. The binding is stored in a data store to locate the access information based on a selection of the channel identifier; so that data from the first data source is accessed from the first data source rather than accessing data received in the first frequency channel. | 2012-01-05 |
20120005714 | METHODS, SYSTEMS, AND COMPUTER PROGRAM PRODUCTS FOR CONFIGURING A CONTEXTUAL CHANNEL IDENTIFIER - Methods and systems are described for configuring a contextual channel identifier. Channel information is received that identifies a channel identifier in a first channel binding, in a first channel context, binding the channel identifier to a first data source. The first data source is accessible via a tuner and is accessed, when the first channel context is active and the channel identifier is selected, to receive data from the first data source to present via an output device. Context configuration information is received identifying a second channel binding that binds the channel identifier to a second data source. The second channel binding is bound to a second channel context, in response to receiving the context configuration information, so that the second data source is accessed, when the second context is active and the channel is selected, to receive data from the second data source to present via an output device. | 2012-01-05 |
20120005715 | APPARATUS AND METHOD FOR TRANSMITTING/RECEIVING DATA IN COMMUNICATION SYSTEM - Provided is an apparatus and method for transmitting and receiving broadcasting data and supplementary data. The method includes: generating broadcasting data and supplementary data for a plurality of predetermined 3D broadcasting services to be provided to users; multiplexing the generated broadcasting data for broadcasting channels respectively allocated to the plurality of predetermined 3D broadcasting services, and multiplexing the generated supplementary data for one commonly broadcasting channel commonly allocated to the plurality of predetermined 3D broadcasting services; encoding the multiplexed supplementary data corresponding to a conditional access system; and transmitting the encoded supplementary data to the one common broadcasting channel, and transmitting the multiplexed broadcasting data to the allocated broadcasting channels. | 2012-01-05 |
20120005716 | SYSTEMS AND METHODS FOR VIDEO STATISTICAL MULTIPLEXING ADAPTING TO INTERNET PROTOCOL NETWORKS - The present invention discloses methods and systems of statistical video multiplexing to improve the performance of video encoding by minimizing delay while achieving high video quality. The video encoders used in the system are capable of calculating the complexity of underlying video sources and communicating the complexity to the multiplexer. Furthermore, the video encoders are capable of estimating the look-ahead complexity, i.e. the future complexity and communicating the future complexity values to the multiplexer. A processor associated with the multiplexer allocates bit rates for the video encoders according to the received complexity values and future complexity values. The bit rate information is then communicated to the video encoders. Each video encoder will then exercise its coding control parameters to regulate the resulting bit rate to be within or close to the allocated bit rate. | 2012-01-05 |
20120005717 | APPARATUS AND METHOD FOR MANAGING THE PRESENTATION OF MEDIA CONTENT - A system that incorporates teachings of the present disclosure may include, for example, a set top box having a controller to receive a single video stream comprising two-dimensional image content and a depth map of the two-dimensional image content, generate three-dimensional image content in real-time from the two-dimensional image content and the depth map where the three-dimensional image content is generated when a display device operably coupled with the set top box is determined to be capable of presenting the three-dimensional image content, and provide either the two-dimensional image content or the three-dimensional image content to the display device. Other embodiments are disclosed. | 2012-01-05 |
20120005718 | TRUSTED NETWORK CONNECT SYSTEM FOR ENHANCING THE SECURITY - Disclosed is a trusted network connect system for enhancing the security, the system including an access requester of the system network that connects to a policy enforcement point in the manner of authentication protocol, and network-connects to the access authorizer via a network authorization transport protocol interface, an integrity evaluation interface and an integrity measurement interface, a policy enforcement point network-connects to the access authorizer via a policy enforcement interface, an access authorizer network-connects to the policy manager via a user authentication authorization interface, a platform evaluation authorization interface and the integrity measurement interface, and an access requester network-connects to a policy manager via the integrity measurement interface. | 2012-01-05 |
20120005719 | Proxy-Based Network Access Protection - In certain embodiments, a method includes receiving, at a proxy, a request for access to a network from an application on an endpoint. The method also includes determining, by the proxy, information about the application on the endpoint by examining one or more headers of the request received at the proxy from the application. The method further includes determining, by the proxy, whether the one or more headers comprise expected information based on the determined information about the application. In response to determining that the one or more headers do not comprise the expected information, the method includes denying, by the proxy, the request for access to the network. In addition, in response to determining that the one or more headers comprise the expected information, the method includes forwarding, by the proxy, the request to the network on behalf of the application. | 2012-01-05 |
20120005720 | Categorization Of Privacy Data And Data Flow Detection With Rules Engine To Detect Privacy Breaches - A runtime approach receives a request from a target location. Data elements are received from a data store. Privacy data type categories corresponding to retrieved data elements are identified. Data flow category is identified based on the target location. Privacy actions are performed modifying some data elements based on the identified privacy data type categories and the data flow category so that the modified data elements comply with one or more data privacy rules pertaining to the target location. A design-time approach retrieves data types included in a software application data design. Privacy categories are selected that correspond to the retrieved data types. Flow categorization data is retrieved that correspond to software application processes. Privacy categories and flow categorization data are compared to privacy rules. A user is informed if privacy rules are violated to facilitate software application modification in order to comply with the privacy rules. | 2012-01-05 |
20120005721 | PROCESSING UNIT ENCLOSED OPERATING SYSTEM - A processing unit for use in an electronic device includes standard instruction processing and communication interfaces and also includes functional capability in addition to or in place of those found in an operating system. A secure memory within the processing unit may contain a hardware identifier, policy data, and subsystem functions such as a secure clock, policy management, and policy enforcement. Data in functions within the secure memory are not accessible from outside the processing unit. | 2012-01-05 |
20120005722 | Application Context Based Access Control - Access control for an application is described. An exemplary method includes receiving a first command of an application to invoke a function of a user interface, identifying a first authorization context based on a first user context and the function of the user interface invoked, retrieving a first access policy providing access criteria associated with the first authorization context, and applying the first access policy to the accessibility of the function. The method includes receiving a second command to invoke the function in a second instance of the application and identifying a second authorization context based on a second user context and the function of the user interface invoked. The second authorization context is different than the first authorization context. The method includes retrieving a second access policy providing second access criteria associated with the second authorization context and applying the second access policy to the accessibility of the function. | 2012-01-05 |
20120005723 | SYSTEM AND METHOD FOR CONCURRENT SESSIONS IN A PEER-TO-PEER HYBRID COMMUNICATIONS NETWORK - An improved system and method are disclosed for peer-to-peer communications. In one example, the method provides for concurrent sessions to be maintained by multiple endpoints. | 2012-01-05 |
20120005724 | METHOD AND SYSTEM FOR PROTECTING PRIVATE ENTERPRISE RESOURCES IN A CLOUD COMPUTING ENVIRONMENT - A method for protecting private enterprise computing resources in a cloud computing environment includes determining a virtual topology comprising a secure computing zone, which includes a secure virtual vault, associated with an enterprise application of a private enterprise in a cloud computing environment. A traffic control policy associated with the secure computing zone is determined that comprises a plurality of security rules that define data traffic flow into, out of, and within the associated secure computing zone. A plurality of cloud computing nodes is selected and associated with the secure virtual vault. Any of the cloud computing nodes is a virtual computer or a physical computer device. The traffic control policy is automatically implemented in each of the cloud computing nodes associated with the secure virtual vault, where each cloud computing node is configured to enforce the plurality of security rules at an operating system level of the cloud computing node. | 2012-01-05 |
20120005725 | TRANSACTIONAL SERVICES - Methods and systems are provided for supporting electronic transactions, including transactions that are provided with per-user, per-device and per-domain security across domains of multiple service providers. | 2012-01-05 |
20120005726 | TRANSACTIONAL SERVICES - Methods and systems are provided for supporting electronic transactions, including transactions that are provided with per-user, per-device and per-domain security across domains of multiple service providers. | 2012-01-05 |
20120005727 | METHOD FOR USER TERMINAL AUTHENTICATION AND AUTHENTICATION SERVER AND USER TERMINAL THEREOF - Provided are a method for user terminal authentication and authentication server and user terminal thereof. The method includes receiving authentication request information for accessing a network from the user terminal, processing a EAP authentication procedure according to the authentication request information, transmitting a message related to the EAP authentication procedure to the user terminal, wherein the message includes network rejection information when network rejection is triggered, and the network rejection information includes network rejection reason information and control information for the user terminal to cope with the network rejection. | 2012-01-05 |
20120005728 | MANAGING MEETING INVITATIONS TO SUB-INVITEES - A computer implemented method manages meeting invitations to sub-invitees. A meeting coordinating computer detects a meeting invitation being sent from a meeting moderator's computer to a primary invitee's computer. The meeting coordinating computer intercepts a response from the primary invitee's computer. This response contains a request for a sub-invitee to accompany the primary invitee to the meeting. If the sub-invitee is initially authorized by the meeting coordinating computer to attend the meeting, then a request is transmitted to the meeting moderator's computer for additional authorization to invite the sub-invitee to the meeting. | 2012-01-05 |
20120005729 | SYSTEM AND METHOD OF NETWORK AUTHORIZATION BY SCORING - A method and system of collecting data from a device seeking authorization for an association with a network, scoring the collected data in accordance with pre-defined criteria, comparing data about the device and request with a past history of requests for authorization by such device, and modifying the score based on such comparison. | 2012-01-05 |
20120005730 | SECURE DETECTION NETWORK SYSTEM - A secure detection network system includes plurality of remote nodes, each remote node comprising a set of detector interfaces configured to couple to a set of detectors disposed to detect the presence of an illegal asset within a shipping container; at least one server node configured to initialize, install, and authenticate each remote node in the plurality of remote nodes, including delivering to each remote node an agent module, said agent module for each remote node comprising a node specific configuration file defining a set of nodes with which the remote node can communicate and a different encryption means corresponding to each node in the set of nodes; and a communication path coupling the plurality of remote nodes and the at least one server node. | 2012-01-05 |
20120005731 | HANDOVER METHOD OF MOBILE TERMINAL BETWEEN HETEROGENEOUS NETWORKS - A handover method of a mobile terminal between heterogeneous networks for facilitating the handover with pre-authentication procedure is provided. A handover method between heterogeneous networks includes receiving, at a mobile terminal connected to a source network, information on at least one target authenticator of a target network from a source authenticator in response to an attach request; creating an authentication key between the mobile terminal and the target authenticator selected among the at least one target authenticator through a pre-authentication process; determining, when the mobile terminal transmits a handover request to the selected target authenticator, whether the authentication key contained in the handover request matches with the authentication key stored in the selected target authenticator; and connecting, when the authentication keys match with each other, to the target network via the selected target authenticator. | 2012-01-05 |
20120005732 | PERSON AUTHENTICATION SYSTEM AND PERSON AUTHENTICATION METHOD - A person authentication system includes: an authentication server storing biometric data for matching related to an anonymous ID of a user; a biometric sensor acquiring biometric data of the user; and a terminal acquiring an anonymous ID stored in an electronic storage medium and transmitting the anonymous ID to the authentication server together with the biometric data acquired by the biometric sensor, wherein the authentication server transmits data needed for an access to personal data stored in the electronic storage medium to the terminal when there is a correspondence to a predetermined extent between the biometric data acquired by the biometric sensor and biometric data for matching related to the anonymous ID. | 2012-01-05 |
20120005733 | VERIFICATION ENGINE FOR USER AUTHENTICATION - Computer-implemented system and methods for authenticating the identity of a person, for example a customer ( | 2012-01-05 |
20120005734 | USER AUTHENTICATION METHOD AND USER AUTHENTICATION SYSTEM - A system for registering a password derivation pattern for deriving a password to be used in user verification includes a terminal device and a server. The terminal device is configured to display a presentation pattern, the presentation pattern including a plurality of elements, each of the plurality elements being assigned with predetermined characters, so as to cause the user to input a character assigned to a specific element with respect to the presentation pattern. The server is connected with the terminal device via a communication channel. The server is configured to repeat the process of displaying a new presentation pattern until the password derivation pattern is specified based on the character inputted by the user. The server is configured to store the specified password derivation pattern. | 2012-01-05 |
20120005735 | System for Three Level Authentication of a User - A system and method for three level authentication of a user has been disclosed. The system | 2012-01-05 |
20120005736 | BIOMETRIC AUTHENTICATION SYSTEM AND METHOD THEREFOR - In the client, a feature quantity extraction unit extracts a feature quantity from biometric information of a user. A feature quantity conversion unit converts the feature quantity by a one-time parameter. In the first server, a parameter DB stores a parameter in association with the ID. A data generation unit generates data based on the parameter corresponding to the ID transmitted from the client. In the second server, a template DB stores a template to which the feature quantity of the biometric information of the user is converted by the parameter, in association with the ID. A template conversion unit generates a one-time template by converting the template corresponding to the ID transmitted from the first server. Then, a match determination unit compares the converted feature quantity transmitted from the client or the data transmitted from the first server with the one-time template to determine whether they match or not. | 2012-01-05 |
20120005737 | SECURE INTERACTIVE DIGITAL SYSTEM FOR DISPLAYING ITEMS TO A USER IDENTIFIED AS HAVING PERMISSION TO ACCESS THE SYSTEM - Methods and apparatus are described which provide secure interactive communication of text and image information between a central server computer and one or more client computers located at remote sites for the purpose of storing and retrieving files describing and identifying unique products, services, or individuals. A feature of the system is the ability to associate an identification image with a plurality of accounts, transactions, or records and identify a user not physically present at the client computer. Textual information and image data from one or more of the remote sites are stored separately at the location of the central server computer, requests for information are entered from remote terminals, the system being able to respond to multiple user requests simultaneously, and the information requested is recalled and downloaded for review to be displayed at the remote site. | 2012-01-05 |
20120005738 | WEB APPLICATION PROCESS - A computer network and corresponding method for providing, as part of a web portal session, access for a user to a web application running on a server. The network comprises first and second traffic managers connected via an intermediate web server. The first traffic manager comprises interface means for receiving from the user, as part of the portal session, a request for access to the web application and for passing the request to the intermediate web server; for forwarding to the second traffic manger. The second traffic manager comprises interface means for receiving the request from the first traffic manager via the intermediate web server and for passing the received request to the web application. | 2012-01-05 |
20120005739 | LINKED IDENTITIES - Methods and systems to automatically respond to make a Super Identity by linking two identities and methods and systems to use the identities include a transaction authorization module that receives a request associated with a first identity record associated with a user, the request being for information associated with a second identity record. An identity linking module identifies that the second identity record is linked to the first identity record and retrieves the information associated with the second identity record. The transaction authorization module also generates a response including the information associated with the second identity, and transmits the response. | 2012-01-05 |
20120005740 | SYSTEM AND METHOD FOR VERIFYING A SECURITY TOKEN - A policy description for a web service is received at a web service client. The policy description includes a predefined security policy constraint, requires that an application requesting execution of the web service also provide a security token generated by a security token service, and requires that the security token complies with the predefined security policy constraint. A message is generated that is compliant with the policy description for obtaining the security token. The message is sent to the security token service. The security token generated by the security token service is received in response to receipt of the message. The security token is compared against the predefined security policy constraint to verify compliance of the security token generated by the security token service against the predefined security policy constraint. | 2012-01-05 |
20120005741 | FIREWALL INTERFACE CONFIGURATION TO ENABLE BI-DIRECTIONAL VOIP TRAVERSAL COMMUNICATIONS - Methods and systems for an intelligent network protection gateway (NPG) are provided. According to one embodiment, a firewall prevents unauthorized network-lawyer access to internal hosts by hosts of an external network by performing network address translation (NAT) processing of Internet Protocol (IP) addresses. The firewall changes data in headers of VoIP packets and corresponding data contents of the VoIP packets, to enable bi-directional VoIP communications. An external VoIP interface of the firewall facilitates concurrent management of multiple incoming VoIP calls by providing multiple VoIP ports and advertising multiple IP address/VoIP port pairs corresponding to internal hosts. When incoming VoIP packets are received, the packets are directed to an appropriate internal host by the firewall performing port forwarding based on a port indication contained within the packets to a server or gatekeeper within the internal network that maintains a mapping of user aliases to private addresses of the internal hosts. | 2012-01-05 |
20120005742 | METHOD AND SYSTEM FOR HANDLING SECURITY IN AN IP MULTIMEDIA GATEWAY - An IP multimedia gateway (IMG) may be operable to identify a client device which may not currently possess a security capability that is compatible with a security capability of a service manager for receiving a service from the service manager. A security process between the client device and the service manager may be enabled by the IMG to enable the client device to receive the service from the service manager. The client device may be local to the IMG or remote with respect to the IMG. The IMG may enable an authentication process between the client device and the service manager by performing authentication translation. The IMG may enable a cryptography process between the client device and the service manager by performing cryptography translation. The IMG may enable an authorization process for authorizing the client device to access a particular content by performing access control conversion. | 2012-01-05 |
20120005743 | INTERNAL NETWORK MANAGEMENT SYSTEM, INTERNAL NETWORK MANAGEMENT METHOD, AND PROGRAM - A relay apparatus log analysis apparatus 132 periodically receives log data from a relay apparatus 112, when detecting a traffic abnormality, an abnormality detection apparatus 131 notifies the IP address of a terminal device that has caused the abnormality to the relay apparatus log analysis apparatus 132, the relay apparatus log analysis apparatus 132 analyzes traffic information generated by a router apparatus 121 to identify a time when the traffic abnormality has occurred, the relay apparatus log analysis apparatus 132 analyzes the log data, based on the occurrence time of the traffic abnormality and the IP address of the terminal device that has caused the abnormality, identifies an address accessed by the terminal device, regards the identified address as the destination from the malware, and sets the relay apparatus 112 so as to block a packet to the address. | 2012-01-05 |
20120005744 | COMMUNICATING APPARATUS FOR PERFORMING COMMUNICATION OVER IP NETWORK BY USING SIP, CONTROLLING METHOD THEREFOR, AND PROGRAM - A communicating apparatus that is able to perform IP-FAX communication without making the user aware of the attack and without any difficulty, even if the device recognizes a DoS attack or the like. communication that uses a SIP server on a network is performed by a communicating unit. Unauthorized communication from the communication performed by the communicating unit is detected. A port number of a receiving port of the communicating unit is changed when the unauthorized communication is detected. it is determined whether or not the detected unauthorized communication has passed through the SIP server. The communicating apparatus is controlled to request the SIP server to delete the port number of the receiving port that has not been changed yet if it is determined that the unauthorized communication has passed through the SIP server and to re-register on the SIP server a port number of a receiving port that has been changed if it is determined that the unauthorized communication has bypassed the SIP server. | 2012-01-05 |
20120005745 | VPN NETWORK CLIENT FOR MOBILE DEVICE HAVING DYNAMICALLY TRANSLATED USER HOME PAGE - A virtual private network (VPN) client for cellular mobile devices is described. The VPN network client processes network packets for securely tunneling the network packets between the cellular mobile device and the remote VPN security device. Upon establishing the VPN connection, the VPN network client receives a web-based home page from the secure VPN device via a secure response, dynamically parses bookmark links from the secure response and renders a bookmark window using input controls native to the cellular mobile device without invoking a web browser on the cellular mobile device. Each of the input controls corresponds to a different one of the bookmarks parsed from the secure response. Upon selection of one of the input controls, the VPN network client formulates and outputs an appropriate request to the secure VPN device as if a corresponding one of the bookmark links were selected by the user. | 2012-01-05 |
20120005746 | DUAL-MODE MULTI-SERVICE VPN NETWORK CLIENT FOR MOBILE DEVICE - An integrated, multi-service network client for cellular mobile devices is described. The multi-service client includes a VPN handler having an interface programmed to exchange the network packets with the security manager for application of the security service, wherein the VPN handler is configurable to operate in one of an enterprise mode and in a non-enterprise mode, wherein in the enterprise mode the VPN handler establishes a VPN connection with a remote VPN security device and provides encryption services to securely tunnel the network packets between the cellular mobile device and the remote VPN security device, and wherein in the non-enterprise mode the VPN handler directs the network packets to the security manager without application of the encryption services and communicates the network packets to a packet-based network without tunneling the packets. | 2012-01-05 |
20120005747 | SYSTEM AND METHOD FOR STORING A PASSWORD RECOVERY SECRET - Disclosed herein are systems, methods, and non-transitory computer-readable storage media for storing a password recovery secret on a peripheral such as a power adapter by receiving a password recovery secret at the power adapter via an interface with the computing device, and storing the password recovery secret on a memory in the power adapter. The password recovery secret can be recovered by requesting the password recovery secret from the power adapter, wherein the password recovery secret is associated with a computing device, receiving the password recovery secret from the memory of the power adapter, and recovering a password based on the password recovery secret. The power adapter can include an electrical source interface, an electronic device interface, an intermediate module to adapt electricity between the interfaces, a memory, and a memory interface through which a password recovery secret is received for storage in the memory. | 2012-01-05 |
20120005748 | SAFETY CONTROLLER AND METHOD FOR CONTROLLING AN AUTOMATED INSTALLATION - A safety controller for controlling an automated installation has a control unit to which a plurality of control input signals are supplied from the sensors of the installation. The control unit produces a plurality of control output signals on the basis of the control input signals in accordance with a user program running in said control unit in an automatic mode. The plurality of control output signals actuate the actuators. The safety controller also has a diagnosis evaluation unit that ascertains which one of a plurality of operating states is present at a defined instant of time and produces an operating state signal which represents the ascertained operating state. A diagnosis selection unit generates a diagnosis report as a function of the operating state signal and as a function of a user access authorization signal and/or a special operating mode signal. The diagnosis report representing the ascertained operating state thus varies depending on specific circumstances, such as a certain user access authorization or a certain operating mode. | 2012-01-05 |
20120005749 | Generic Fraud Detection Model - A method for dynamically updating a model is described. The method includes accessing a model that specifies expected characteristics for a transaction. The model includes variables associated with fraud. The method also includes receiving at least one value for each of the variables while monitoring transactions, and updating a distribution of values for each variable based on the received value. The received value is compared with the updated distribution to determine a deviation from a threshold value associated with a percentile of the updated distribution that is indicative of fraud. | 2012-01-05 |
20120005750 | Systems and Methods for Alternating Malware Classifiers in an Attempt to Frustrate Brute-Force Malware Testing - A computer-implemented method for alternating malware classifiers in an attempt to frustrate brute-force malware testing may include (1) providing a group of heuristic-based classifiers for detecting malware, wherein each classifier within the group differs from all other classifiers within the group but has an accuracy rate that is substantially similar to all other classifiers within the group, (2) including the group of classifiers within a security-software product, and (3) alternating the security-software product's use of the classifiers within the group in an attempt to frustrate brute-force malware testing by (a) randomly selecting and activating an initial classifier from within the group and then, upon completion of a select interval, (b) replacing the initial classifier with an additional classifier randomly selected from within the group. Various other methods, systems, and computer-readable media are also disclosed. | 2012-01-05 |
20120005751 | Systems and Methods for Creating Customized Confidence Bands for Use in Malware Detection - A computer-implemented method for creating customized confidence bands for use in malware detection may include 1) identifying a portal for receiving executable content, 2) identifying metadata relating to the portal, 3) analyzing the metadata to determine what risk executable content received via the portal poses, and then 4) creating, based on the analysis, a confidence band to apply during at least one disposition of executable content received via the portal. Various other methods, systems, and computer-readable media are also disclosed. | 2012-01-05 |
20120005752 | Method and system for detecting and removing hidden pestware files - A method and system for detecting and removing a hidden pestware file is described. One illustrative embodiment detects, using direct drive access, a file on a computer storage device; determines whether the file is also detectable by the operating system by attempting to access the file using a standard file Application-Program-Interface (API) function call of the operating system; identifies the file as a potential hidden pestware file, when the file is undetectable by the operating system; confirms through an automated pestware-signature scan of the potential hidden pestware file that the potential hidden pestware file is a hidden pestware file; and removes automatically, using direct drive access, the hidden pestware file from the storage device. | 2012-01-05 |
20120005753 | INTRUSIVE SOFTWARE MANAGEMENT - Intrusion features of a landing page associated with sponsored content are identified. A feature score for the landing page based on the identified intrusion features is generated, and if the feature score for the landing page exceeds a feature threshold, the landing page is classified as a candidate landing page. A sponsor account associated with the candidate landing page can be suspended, or sponsored content associated with the candidate landing page can be suspended. | 2012-01-05 |
20120005754 | METHOD FOR RECORDING, RECOVERING, AND REPLAYING REAL TRAFFIC - A recording, recovering, and replaying method for real traffic is used for processing a plurality of network packets of a plurality of network connections. A recording procedure of the method includes the following steps. A recording parameter (N, M, P) is received. A header and a payload of each network packet of the network connections are completely recorded, and a payload accumulation value of each network connection is accumulated. When one of the payload accumulation values exceeds N, the header of each network packet and first M bytes of the payload are recorded for P consecutive network packets corresponding to the payload accumulation value. When one of the payload accumulation values exceeds N and after the P consecutive network packets of the network connection corresponding to the payload accumulation value are recorded, the header of each network packet is recorded for the network connection corresponding to the payload accumulation value. | 2012-01-05 |
20120005755 | INFECTION INSPECTION SYSTEM, INFECTION INSPECTION METHOD, STORAGE MEDIUM, AND PROGRAM - When detecting a traffic abnormality, an abnormality detection apparatus | 2012-01-05 |
20120005756 | NETWORK SECURITY ARCHITECTURE - A network security system is deployed between an internet backbone and intranets that belong to subscribing organizations. The system includes a scanning system that scans incoming electronic mail for malicious code and an anti-virus server for downloading anti-virus code to clients on the intranets. A switch is provided for directing incoming electronic mail from the internet backbone to the scanning system so that the electronic mail can be scanned. In one embodiment, a decoy server is also provided for masquerading as a legitimate server and logging suspicious activity from communications received from the internet backbone. | 2012-01-05 |
20120005757 | COMPUTER ENABLED METHODS TO INHIBIT FILE AND VOLUME NAME COPYING AND TO CIRCUMVENT SAME - Provided here is a copy protection method and apparatus to confuse currently available personal computer software (and other content) copying packages by use of unexpected (“illegal”) special characters in the volume (or directory) name for the software or other content or data subject to being copied. This method can be used alone or with a broad range of other known copy protection technologies such as RipGuard (available from Macrovision Corp.). Also provided here is a method and apparatus to defeat the confusion method, thereby allowing copying of such copy protected software. | 2012-01-05 |
20120005758 | METHOD AND DEVICE FOR SELECTIVELY PROTECTING ONE OF A PLURALITY OF METHODS OF A CLASS OF AN APPLICATION WRITTEN IN AN OBJECT-ORIENTATED LANGUAGE - There is provided a method for selectively protecting one of a plurality of methods of a class of an application written in an object-orientated language, in particular Java, wherein a protected application is created by adding a protection module to the application, analyzing a first method to be protected of a plurality of methods of a first class of the application and determining first parameters needed for executing the first method, generating first gate code depending on the determined first parameters, replacing the first code of the first method by said first gate code and storing the replaced first code such that it can be accessed by the protection module during execution of the protected application, wherein, when the first method is called during execution of the protected application, the first gate code collects first data based on the determined first parameters and transmits the collected first data to the protection module, the protection module accesses the stored first code and generates a new class including a first substitution method based on the stored first code, instantiates the new class, invokes the first substitution method and passes at least a part of the collected first data to the invoked first substitution method so that the executed first substitution method provides the functionality of the first method, and returns execution to the first gate code after execution of the first substitution method. | 2012-01-05 |
20120005759 | IMAGE DISPLAY DEVICE, IMAGE DISPLAY METHOD, AND RECORDING MEDIUM - When a screen capture operation is monitored and a screen capture operation for instructing acquisition of an image displayed on a display device ( | 2012-01-05 |
20120005760 | SYSTEM AND METHOD FOR RENDERING CONTENT ASSOCIATED WITH A DIGITAL WORK - A method, system and software for permitting use of digital works having rights associated therewith in a system having repositories configured to enable use of the digital work in accordance with the rights, including associating a transfer right with a digital work, the transfer right specifying that the digital work is transferred from a first repository to a second repository; transferring the digital work from the first repository to the second repository in accordance with the transfer right; and in response to the transferring, step updating transfer right information in respect of the digital work. | 2012-01-05 |
20120005761 | MOBILE ACCESS TO DIGITAL MEDIA - A computer implemented method provides a specific traveler with mobile access to a digital media library. A plurality of registration stations, which are utilized in a travel and lodging industry to acknowledge arrivals and departures of travelers, are monitored. In response to detecting a specific traveler checking in at a pre-determined registration station from the plurality of registration stations, contents of a pre-defined digital media library are transmitted to a digital media player for use by the specific traveler. | 2012-01-05 |
20120005762 | SYSTEM AND METHOD FOR RENDERING CONTENT ASSOCIATED WITH A DIGITAL WORK - A method, system and software for permitting use of digital works having rights associated therewith in a system having repositories configured to enable use of the digital work in accordance with the rights, including associating a transfer right with a digital work, the transfer right specifying that the digital work is transferred from a first repository to a second repository; transferring the digital work from the first repository to the second repository in accordance with the transfer right; and in response to the transferring, step updating transfer right information in respect of the digital work. | 2012-01-05 |
20120005763 | SYSTEM AND METHOD FOR RENDERING CONTENT ASSOCIATED WITH A DIGITAL WORK - A method, system and software for permitting use of digital works having rights associated therewith in a system having repositories configured to enable use of the digital work in accordance with the rights, including associating a transfer right with a digital work, the transfer right specifying that the digital work is transferred from a first repository to a second repository; transferring the digital work from the first repository to the second repository in accordance with the transfer right; and in response to the transferring, step updating transfer right information in respect of the digital work. | 2012-01-05 |
20120005764 | Systems and Methods for Governing Content Rendering, Protection, and Management Applications - System and methods are disclosed for governing digital rights management systems and other applications through the use of supervisory governance applications and keying mechanisms. Governance is provided by enabling the supervisory applications to revoke access keys and/or to block certain file system calls, thus preventing governed applications from accessing protected electronic content. | 2012-01-05 |
20120005765 | ANIMAL MODEL FOR PARKINSON'S DISEASE - Disclosed are methods and compositions for an animal model of Parkinson's disease. In particular, disclosed is the use of antisense compounds to inhibit the expression of ALDH1A1 in the substantia nigra of an animal brain for the purpose of creating an animal that will displays the symptoms of a human with Parkinson's Disease, including various biochemical, histological, and behavioral characteristics. Also disclosed are methods for using the animal model for Parkinson's disease to test potential therapeutic agents for Parkinson's disease. | 2012-01-05 |
20120005766 | Methods of identifying agents that modulate phenotypes related to disruptions, of a gene encoding PRO235 polypeptide - The present invention relates to transgenic animals, as well as compositions and methods relating to the characterization of gene function. Specifically, the present invention provides transgenic mice comprising disruptions in PRO188, PRO235, PRO266, PRO337, PRO361, PRO539, PRO698, PRO717, PRO846, PRO874, PRO98346, PRO1082, PRO1097, PRO1192, PRO1268, PRO1278, PRO1303, PRO1308, PRO1338, PRO1378, PRO1415, PRO1867, PRO1890, PRO3438, PRO19835, PRO36915, PRO36029, PRO4999, PRO5778, PRO5997, PRO6079, PRO6090, PRO7178, PRO21184, PRO7434, PRO9822, PRO9833, PRO9836, PRO9854, PRO9862, PRO10284, PRO37510, PRO35444, PRO20473, PRO21054 or PRO35246 genes. Such in vivo studies and characterizations may provide valuable identification and discovery of therapeutics and/or treatments useful in the prevention, amelioration or correction of diseases or dysfunctions associated with gene disruptions such as neurological disorders; cardiovascular, endothelial or angiogenic disorders; cyc abnormalities; immunological disorders; oncological disorders; bone metabolic abnormalities or disorders; lipid metabolic disorders; or developmental abnormalities. | 2012-01-05 |
20120005767 | ANTIBODIES TO INSULIN-LIKE GROWTH FACTOR I RECEPTOR - The present invention relates to antibodies and antigen-binding portions thereof that specifically bind to insulin-like growth factor I receptor (IGF-IR), which is preferably human IGF-IR. The invention also relates to human anti-IGF-IR antibodies, including chimeric, bispecific, derivatized, single chain antibodies or portions of fusion proteins. The invention also relates to isolated heavy and light chain immunoglobulin molecules derived from anti-IGF-IR antibodies and nucleic acid molecules encoding such molecules. The present invention also relates to methods of making anti-IGF-IR antibodies, pharmaceutical compositions comprising these antibodies and methods of using the antibodies and compositions thereof for diagnosis and treatment. The invention also provides gene therapy methods using nucleic acid molecules encoding the heavy and/or light immunoglobulin molecules that comprise the human anti-IGF-IR antibodies. The invention also relates to gene therapy methods and transgenic animals comprising nucleic acid molecules of the present invention. | 2012-01-05 |
20120005768 | Circovirus Sequences Associated With Piglet Weight Loss Disease (PWD) - The genome sequences and the nucleotide sequences coding for the PWD circovirus polypeptides, such as the circovirus structural and non-structural polypeptides, vectors including the sequences, and cells and animals transformed by the vectors are provided. Methods for detecting the nucleic acids or polypeptides, and kits for diagnosing infection by a PWD circovirus, also are provided. Method for selecting compounds capable of modulating the viral infection are further provided. Pharmaceutical, including vaccine, compositions for preventing and/or treating viral infections caused by PWD circovirus and the use of vectors for preventing and/or treating diseases also are provided. | 2012-01-05 |
20120005769 | CHIMERIC GENE WITH SEVERAL HERBICIDE TOLERANCE GENES, PLANT CELL AND PLANT RESISTANT TO SEVERAL HERBICIDES - 1. Chimeric gene containing several herbicide tolerance genes, plant cell and plant which are tolerant to several herbicides. | 2012-01-05 |
20120005770 | VEGETABILE MATERIAL, PLANTS AND A METHOD OF PRODUCING A PLANT HAVING ALTERED LIGNIN PROPERTIES - The present invention is related to a set of genes, which when modified in plants gives altered lignin properties. The invention provides DNA construct such as a vector useful in the method of the invention. Further, the invention relates to a plant cell or plant progeny of the plants and wood produced by the plants according to the invention Lower lignin levels will result in improved saccharification for bio-refining and ethanol production and improved pulp and paper. Increased lignin levels will utilise lignin properties for energy production. The genes and DNA constructs may be used for the identification of plants having altered lignin characteristics as compared to the wild-type. According to the invention genes and DNA constructs may also be used as candidate genes in marker assisted breeding. | 2012-01-05 |
20120005771 | Lettuce Cultivar Jemez - A lettuce cultivar, designated Jemez, is disclosed. The invention relates to the seeds of lettuce cultivar Jemez, to the plants of lettuce cultivar Jemez and to methods for producing a lettuce plant by crossing the cultivar Jemez with itself or another lettuce cultivar. The invention further relates to methods for producing a lettuce plant containing in its genetic material one or more transgenes and to the transgenic lettuce plants and plant parts produced by those methods. This invention also relates to lettuce cultivars or breeding cultivars and plant parts derived from lettuce cultivar Jemez, to methods for producing other lettuce cultivars, lines or plant parts derived from lettuce cultivar Jemez and to the lettuce plants, varieties, and their parts derived from the use of those methods. The invention further relates to hybrid lettuce seeds, plants, and plant parts produced by crossing cultivar Jemez with another lettuce cultivar. | 2012-01-05 |
20120005772 | Lettuce Cultivar Dragoon - A lettuce cultivar, designated Dragoon, is disclosed. The invention relates to the seeds of lettuce cultivar Dragoon, to the plants of lettuce cultivar Dragoon and to methods for producing a lettuce plant by crossing the cultivar Dragoon with itself or another lettuce cultivar. The invention further relates to methods for producing a lettuce plant containing in its genetic material one or more transgenes and to the transgenic lettuce plants and plant parts produced by those methods. This invention also relates to lettuce cultivars or breeding cultivars and plant parts derived from lettuce cultivar Dragoon, to methods for producing other lettuce cultivars, lines or plant parts derived from lettuce cultivar Dragoon and to the lettuce plants, varieties, and their parts derived from the use of those methods. The invention further relates to hybrid lettuce seeds, plants, and plant parts produced by crossing cultivar Dragoon with another lettuce cultivar. | 2012-01-05 |
20120005773 | TRANSGENIC PLANTS WITH ENHANCED AGRONOMIC TRAITS - This invention provides transgenic plant cells with recombinant DNA for expression of proteins that are useful for imparting enhanced agronomic trait(s) to transgenic crop plants. This invention also provides transgenic plants and progeny seed comprising the transgenic plant cells where the plants are selected for having an enhanced trait selected from the group of traits consisting of enhanced water use efficiency, enhanced cold tolerance, increased yield, enhanced nitrogen use efficiency, enhanced seed protein and enhanced seed oil. Also disclosed are methods for manufacturing transgenic seed and plants with enhanced trait. | 2012-01-05 |
20120005774 | USE OF TREHALASE TO OBTAIN DROUGHT RESISTANCE IN PLANTS - The present invention relates to the use of trehalase to obtain drought and/or salt resistance in plants. More specifically, it relates to genetically modified constructs, transformed into plants and resulting in overexpression of trehalase, whereby the transformed plants show a significantly better drought resistance during the drought period, and a better recovery when water is supplied after the drought period. | 2012-01-05 |
20120005775 | NITRATE TRANSPORT COMPONENTS - This invention relates to isolated nucleic acid fragments encoding high affinity nitrate transport components. The invention also relates to the construction of recombinant DNA constructs encoding all or a portion of nitrate transport components, in sense or antisense orientation, wherein expression of the recombinant DNA construct may alter levels of the nitrate transport components in a transformed host cell. | 2012-01-05 |
20120005776 | NONVIRAL VECTORS FOR DELIVERING POLYNUCLEOTIDES TO PLANTS - Methods and compositions for delivering polynucleotides are provided. One embodiment provides a non-viral vector comprising a recombinant polynucleotide-binding protein comprising a protein transduction domain operably linked to a targeting signal. Methods for modifying the genome of non-nuclear organelles are also provided. | 2012-01-05 |
20120005777 | Process for the Production of Fine Chemicals - The present invention relates to a process for the production of fine chemicals in a microorganism, a plant cell, a plant, a plant tissue or parts thereof. The invention furthermore relates to nucleic acid molecules, polypeptides, nucleic acid constructs, vectors, antisense molecules, antibodies, host cells, plant tissue, propagtion material, harvested material, plants, microorganisms as well as agricultural compositions and to their use. | 2012-01-05 |
20120005778 | BRITTLE STALK 2 GENE FAMILY AND RELATED METHODS AND USES - This invention relates to isolated polynucleotides encoding BRITTLE STALK 2-like (Bk2L) family polypeptides. The invention also relates to the construction of a chimeric gene encoding all or a portion of a Bk2L polypeptide, in sense or antisense orientation, wherein expression of the chimeric gene results in production of altered levels of the Bk2L polypeptide in a transformed host cell. | 2012-01-05 |
20120005779 | PLASTIDIC PHOSPHOGLUCOMUTASE GENES - An isolated nucleic acid fragment encoding a plastidic phosphoglucomutase protein is disclosed. Also disclosed is the construction of a chimeric gene encoding all or a substantial portion of the plastidic phosphoglucomutase, in sense or antisense orientation, wherein expression of the chimeric gene results in production of altered levels of the plastidic phosphoglucomutase in a transformed host cell. | 2012-01-05 |
20120005780 | UDP-Xylose Synthases (UXS) Polynucleotides, Polypeptides and Uses Thereof - The present disclosure concerns methods and compositions relating to UXS polypeptides and/or nucleic acids encoding UXS polypeptides. In certain claims, the methods and compositions are of use to improve digestibility and/or ease of grain processing. Such improvements relate to a modulation in arabinoxylan and/or hemicellulose content in transgenic plants. Such plants can, for example, comprise one or more nucleic acid sequences that inhibit expression of one or more UDP-Xylose Synthase (UXS) genes. | 2012-01-05 |
20120005781 | NUCLEOTIDE SEQUENCES AND CORRESPONDING POLYPEPTIDES CONFERRING MODULATED PLANT GROWTH RATE AND BIOMASS IN PLANTS - The present invention relates to isolated nucleic acid molecules and their corresponding encoded polypeptides able confer the trait of modulated plant size, vegetative growth, organ number, plant architecture, growth rate, seedling vigor, growth rate, fruit and seed yield, tillering and/or biomass in plants. The present invention further relates to the use of these nucleic acid molecules and polypeptides in making transgenic plants, plant cells, plant materials or seeds of a plant having plant size, vegetative growth, organ number, plant architecture, growth rate, seedling vigor and/or biomass that are altered with respect to wild type plants grown under similar conditions | 2012-01-05 |
20120005782 | CHEMICALLY INDUCIBLE CUCUMBER MOSAIC VIRUS PROTEIN EXPRESSION SYSTEM - The invention relates to a novel chemically inducible plant viral amplicon (CMViva) expression system that permits controllable, high level expression of foreign genes in plant hosts. This system employs agro-infiltration of plants to provide a transient production of a protein of interest, such as a human blood protein. This system provides a major advantage over existing plant expression systems because it allows for consistent expression of foreign or heterologous proteins in plant hosts. | 2012-01-05 |
20120005783 | ICE RECRYSTALLISATION INHIBITION PROTEIN OR ANTIFREEZE PROTEINS FROM DESCHAMPSIA, AND FESTUCA SPECIES OF GRASS - The present invention relates to nucleic acids or nucleic acid fragments encoding amino acid sequences for polypeptides involved in tolerance to freezing and/or low temperature stress in plants. More particularly, the present invention relates to nucleic acids or nucleic acid fragments encoding amino acid sequences for ice recrystallisation inhibition proteins (IRIPs) in plants, and the use thereof for the modification of plant response to freezing and/or low temperature stress. Even more particularly, the present invention relates to polypeptides involved in tolerance to freezing and/or low temperature stress in | 2012-01-05 |
20120005784 | PLANT TOLERANCE TO LOW WATER, LOW NITROGEN AND COLD II - Polynucleotides incorporated into nucleic acid constructs have been introduced into plants and were ectopically expressed. The encoded polypeptides of the invention have been shown to confer at least one regulatory activity and confer earlier flowering, longer floral organ retention, increased cold tolerance, greater tolerance to water deprivation, altered carbon-nitrogen balance sensing, increased low nitrogen tolerance, and/or increased tolerance to hyperosmotic stress as compared to a control plant. | 2012-01-05 |
20120005785 | PLANTS HAVING IMPROVED GROWTH CHARACTERISTICS AND METHOD FOR MAKING THE SAME - The present invention concerns a method for improving growth characteristics of plants by increasing expression and/or activity in a plant of an LRR receptor kinase or a homologue thereof. One such method comprises introducing into a plant an RLK827 nucleic acid molecule or functional variant thereof. The invention also relates to transgenic plants having improved growth characteristics, which plants have modulated expression of a nucleic acid encoding an LRR receptor kinase. The present invention also concerns constructs useful in the methods of the invention. | 2012-01-05 |
20120005786 | Isolated Polynucleotide Molecules Corresponding to Mutant and Wild-Type Alleles of the Maize D9 Gene and Methods of Use - The invention provides isolated polynucleotide molecules encoding mutant and wild-type alleles of the maize D9 gene. The invention further provides methods for modifying the growth of plants by decreasing or increasing plant height, altering stem and/or root growth, and involving the use of these isolated polynucleotide molecules, isolated polypeptides and transformed plants, seeds and cells. | 2012-01-05 |
20120005787 | GENE FOR INCREASING THE PRODUCTION OF PLANT BIOMASS AND/OR SEEDS AND METHOD FOR USE THEREOF - A technique by which the production of plant biomass can be significantly increased is provided. A gene encoding protein phosphatase 2C having 3 consensus sequences comprising the amino acid sequences shown in SEQ ID NOS: 1-3 from the N-terminal side in such order and a gene encoding glutathione-binding plastid-type fructose 1,6-bisphosphate aldolase is introduced, or an expression control region of endogenous genes corresponding to the genes are modified. | 2012-01-05 |
20120005788 | MANUFACTURE OF XYLONIC ACID - Provided is a method for producing xylonic acid from xylose with a recombinant fungal strain that is genetically modified to express a xylose dehydrogenase gene, which is able to convert xylose to xylonolactone, which is spontaneously or enzymatically hydrolysed to xylonic acid. The xylonic acid is excreted outside the host cell. Xylonate production may be coupled with xylitol production. Alternatively, if xylitol production is not desired, its production is reduced by removing the aldose reductase (or specific xylose reductase) enzyme, which converts xylose to xylitol. Expression of a heterologous lactonase encoding gene may result in higher acid concentrations. The method is suitable for producing xylonic acid from a hemicellulose hydrolysate such as hydrolysed lignocellulosic plant biomass. | 2012-01-05 |
20120005789 | Targeted Integration And Stacking Of DNA Through Homologous Recombination - The invention provides various methods for the targeted integration and stacking of nucleotide sequences in the genome of a host plant cell using homologous recombination. | 2012-01-05 |
20120005790 | ANALOGS OF TEMPORIN-SHA AND USES THEREOF - The present invention relates to novel antimicrobial peptides, to pharmaceutical compositions comprising said peptides, and to the uses thereof, in particular as antimicrobial drugs, disinfectants, pesticides or preservatives. The present invention also relates to a transgenic plant expressing said novel peptides. | 2012-01-05 |
20120005791 | Soybean MTH1 Promoter And Its Use In Constitutive Expression Of Transgenic Genes In Plants - The promoter of a soybean metallothionein protein (MTH1) and fragments thereof and their use in promoting the expression of one or more heterologous nucleic acid fragments in a tissue-independent or constitutive manner in plants are described. | 2012-01-05 |
20120005792 | Nucleotide Sequences Mediating Male Fertility and Method of Using Same - Nucleotide sequences mediating male fertility in plants are described, with DNA molecule and amino acid sequences set forth. Promoter sequences and their essential regions are also identified. The nucleotide sequences and promoter sequences are useful in methods mediating male fertility in plants, as described. Vectors, plant cells, and plants comprising the nucleotide sequences and/or promoter regions are also provided. | 2012-01-05 |
20120005793 | NEAR FIELD OPTICAL MICROSCOPE - The invention relates to a device for conducting near-field optical measurements of a specimen, a method for conducting near-field optical measurements and the use of the device. | 2012-01-05 |
20120005794 | Caladium plant named 'SNOW WHITE PARK' - A new and distinct | 2012-01-05 |