08th week of 2010 patent applcation highlights part 72 |
Patent application number | Title | Published |
20100050223 | CHAINCAST METHOD AND SYSTEM FOR BROADCASTING INFORMATION TO MULTIPLE SYSTEMS WITHIN THE INTERNET - A method and system for performing chaincast communication to multiple communication systems within a system of coupled electronic devices. In one implementation the electronic devices can be computer systems and the system of coupled electronic devices includes the Internet. The present invention provides a system wherein a broadcast source communicates broadcast information (e.g., encoded audio radio content, encoded audio/video television content, program instructions, etc.) to a first group of electronic devices. The first group of electronic devices can be instructed by a transmission scheduler to then communicate (e.g., forward) the broadcast information to other electronic devices which devices can also be instructed to communicate to more devices, etc., thereby reducing the bandwidth requirements of the communication channel between the broadcast source and the first group of electronic devices. | 2010-02-25 |
20100050224 | DISPLAY APPARATUS AND CONTROL METHOD THEREOF - A display apparatus and a control method thereof are provided. The display apparatus includes: a video processing unit which processes a first video; a display unit which displays the first video; a connecting unit which receives a second video of an image communication from a mobile communication terminal which enables the image communication; and a control unit which controls the video processing unit to process the second video of the image communication to display the second video in the display unit, and controls the mobile communication terminal based on a control command of a user. | 2010-02-25 |
20100050225 | SOURCE FRAME ADAPTATION AND MATCHING OPTIMALLY TO SUIT A RECIPIENT VIDEO DEVICE - A digital electronic device supports program transmission to a recipient device via the Internet. A frame adapter decodes incoming IP program packets and re-encodes resulting program signals adaptively to optimally suit the recipient device based upon configuration data of the recipient device. The frame adapter receives feedback from the recipient device, which may include a characterization of a communication path between the digital electronic device and the recipient device. The frame adapter utilizes the configuration information to generate the optimal video frame stream that is transmitted to the recipient device. The compression itself involves producing optimal number of base and predicted video frames. The adaptive encoder and multiplexer receives digitized program signals either from a local source or from an external program source, transcodes (optionally), encodes and multiplexes them adaptively to optimally suit individual recipient devices, based on configurations of the corresponding recipient devices. | 2010-02-25 |
20100050226 | KVM VIDEO & OSD SWITCH - A high speed video switch in a KVM system using discrete Radio Frequency (RF) switch circuits. The RF switch circuits are configured into a multiplexed circuit to route video signals from a selected host computer to a target monitor. Voltage converters are used to provide control signals of the proper voltage to the RF switch circuits. Peaking operational amplifiers are used to compensate for the roll-off effect caused by the video connectors. An On Screen Display (OSD) switch using the RF switches is used to rapidly switch between the OSD data and host computer video for display to the target operator control center monitor. | 2010-02-25 |
20100050227 | Update Process for Interface Device Based Targeted Information Insertion - Advertisements or other types of targeted information are delivered to set-top boxes or other user interface devices of a signal distribution system. In one aspect of the invention, at least one multicast update comprising updated targeted information is sent to the user interface devices during a multicast update period. If a given one of the user interface devices is unable to obtain a complete set of the updated targeted information from the multicast update before timeout of the multicast update period, a unicast update comprising at least a portion of the updated targeted information is sent to the given user interface device during a unicast update period. The unicast update may be sent responsive to a request from the given user interface device for a designated portion of the updated targeted information. | 2010-02-25 |
20100050228 | DTV with detachable HDMI inputs - A television device has a television receiver residing substantially within a television receiver enclosure. A high definition multimedia interface is (HDMI) coupled to the television receiver. A detachable HDMI switch is operatively coupled to the HDMI interface, the HDMI switch and has at least two user-side HDMI buses connected thereto. The detachable HDMI switch resides in an HDMI switch housing that exposes the at least two user-side HDMI connector ports. The detachable HDMI switch housing is detachably connected to the television receiver enclosure to permit the HDMI switch housing to be either attached to the television receiver enclosure for use at the television receiver enclosure, or to permit the HDMI switch housing to be separated from the television receiver enclosure to permit the HDMI switch housing to be situated remotely from the television receiver enclosure so that the HDMI connector ports are remotely accessible while being selectable by the television device. This abstract is not to be considered limiting, since other embodiments may deviate from the features described in this abstract. | 2010-02-25 |
20100050229 | VALIDATING NETWORK SECURITY POLICY COMPLIANCE - The present invention may provide the ability to determine the actions triggered by a network security policy given a set of conditions. Embodiments of the invention involve testing the security policy at specified times, documenting and analyzing the test results for compliance, recording the results for auditing purposes, writing events to warn of non-compliance findings, and dynamically taking defensive action to prevent security breaches as the result of non-compliance findings. | 2010-02-25 |
20100050230 | Method of inspecting spreadsheet files managed within a spreadsheet risk reconnaissance network - A method of inspecting spreadsheet files managed within a spreadsheet risk reconnaissance network. The method involves a spreadsheet inspector logging-on to the network, and selecting a spreadsheet inspection from the list of spreadsheet inspections to be performed. In response to the selection, the network automatically generates an inspection worksheet for each policy component which is to be manually inspected by the inspector. The inspection worksheet includes all policy compliance components which require human judgment to assess the degree to which an item passes compliance, as well as general notes to allow for inspection items which are not related to the specific compliance items. Upon receiving the network-generated inspection worksheet, the spreadsheet inspector opening the spreadsheet file to be inspected, via a provided hyperlink, and applying human judgment in assessing whether or not the spreadsheet file successfully passes each set of criteria established in the spreadsheet policy. For each policy component being assessed, the spreadsheet inspector evaluating the spreadsheet file and providing a passing grade if the spreadsheet file meets the criteria established in the policy component, and a failing grade if the spreadsheet file does not meet the established criteria in the policy component. An overall assessment score of passing or failing is provided to each spreadsheet file under assessment, based on automated and/or manual assessments. | 2010-02-25 |
20100050231 | Resolving retention policy conflicts - Resolving retention policy conflicts is disclosed. An indication is received that two or more retention policies apply to an item of content. A merged retention policy that is based at least in part on the respective requirements of the two or more retention policies is generated automatically for the item of content. | 2010-02-25 |
20100050232 | SYSTEMS AND METHODS FOR MANAGING POLICIES ON A COMPUTER - An apparatus, system, and method are disclosed for managing policies on a computer having a foreign operating system. Policies may specify hardware or software configuration information. Policies on a first computer with a native operating system are translated into configuration information usable on a second computer having a foreign operating system. In an embodiment, a translator manager manages the association between the policy on the first computer and the translator on the second computer. Computer management complexity and information technology management costs are reduced by centralizing computer management on the native operating system. Further reductions in management complexity are realized when the present invention is used in conjunction with network directory services. | 2010-02-25 |
20100050233 | VERIFICATION ENGINE FOR USER AUTHENTICATION - Computer-implemented system and methods for authenticating the identity of a person, for example a customer ( | 2010-02-25 |
20100050234 | Provision of Access Information in a Communication Network - A method and apparatus for providing user access information to a Home Subscriber Server (HSS) in an IP Multimedia Subsystem (IMS) network. A User Equipment transmits to a Call Session Control Function (CSCF), a message containing a P-Access-Network-Info (PANI) header. The CSCF or an Application Server then sends user access information retrieved from the PANI header to the HSS, which stores the information. The stored information can be used to control access to the IMS network based on the access network being utilized or the user location. | 2010-02-25 |
20100050235 | METHODS AND APPARATUS FOR REDUCING THE EFFECTIVENESS OF CHOSEN LOCATION ATTACKS IN A PEER-TO-PEER OVERLAY NETWORK - Methods and apparatus for reducing the effectiveness of chosen location attacks in a peer-to-peer overlay network. A method includes determining that new node identifiers are to be generated for a plurality of nodes in the network, inputting parameters to a hash function to generate a selected node identifier, and adopting a location in the network associated with the selected node identifier. Another method includes receiving a node identifier associated with a selected node, inputting parameters associated with the selected node to a hash function to generate a corresponding node identifier, comparing the node identifier with the corresponding node identifier, and determining that the selected node is a potential attacker if the node identifiers do not match. Another method includes detecting responsibility for initiating an update to one or more node identifiers, generating parameters to generate the node identifiers, and transmitting the parameters on the network. | 2010-02-25 |
20100050236 | QUALITY ASSURED ANALYTICAL TESTING SYSTEM AND METHOD THEREOF - A system and method for quality assured analytical testing is disclosed. A user is prompted by the system questions which relate to an analytical test to be conducted or an analytical instrument to be employed. Input received by the system from the user is evaluated to determine to which degree the inputs are correct. The user is certified if the determined degree is above a preset threshold. Next, the user is prompted by the system for a user identification and if the user is a certified user, access is provided to a testing routine of the analytical instrument. | 2010-02-25 |
20100050237 | GENERATING USER AND AVATAR SPECIFIC CONTENT IN A VIRTUAL WORLD - Generation of user and avatar specific content in a virtual world may include generating a local attribute object. The local attribute object may comprise attributes identifying at least one of the user's real world location and the user's avatar's virtual world location. Access to the local attribute object by virtual world operators may be controlled by the user and/or user's avatar. Specific content, based on the local attribute object, is presented to the user's avatar. | 2010-02-25 |
20100050238 | SYSTEM AND METHOD FOR A WPAN FIREWALL - Systems and methodologies for implementing Wireless Personal Area Network (WPAN) security are provided herein. As disclosed herein, firewall functionality can be implemented for a WPAN-capable device to control access to resources of the device over a WPAN. In one example, a WPAN protocol can be extended to include low-level access control measures that enable analysis of communication requests to and/or from a device prior to acting on the requests. As described herein, a WPAN firewall associated with a device can be configured to block, monitor, and/or log respective resource accesses to and/or from a WPAN. WPAN firewall functionality as described herein can be configured using mechanisms such as an Application Programming Interface (API) and/or a user control interface. Additionally, lateral regulation of security policies for a WPAN and one or more other networks utilized by a device can be provided. | 2010-02-25 |
20100050239 | AUTOMATED SERVICE PLATFORM PROSPECTING - Techniques for automated service platform prospecting are provided. A prospector process is sent out in advance to scout for potential network sites that provide computing infrastructure and computing services (platforms) to self-contained computing environments. The prospector process validates the potential network sites for use and gathers site characteristics that are used to configure the self-contained computing environments when they are to be installed and executed on those network sites. | 2010-02-25 |
20100050240 | WIRELESS NETWORK HAVING MULTIPLE SECURITY INTERFACES - A number of wireless networks are established by a network device, each wireless network having an identifier. Requests are received from client devices to establish wireless network sessions via the wireless networks using the identifiers. Network privileges of the client devices are segmented into discrete security interfaces based on the identifier used to establish each wireless network session. | 2010-02-25 |
20100050241 | Accessing memory device content using a network - A first storage unit is bound to a second storage unit based on a binding type associated with content on the first storage unit, the first storage unit being operated through a first host device, and the second storage unit being operated through a second host device. When content on the first storage unit is requested in the first host device, the first host device will calculate an account identifier based on the binding type associated with the requested content and send the account identifier to a server. The server will send the account identifier to the second host device, and the second storage unit will use the account identifier to calculate a credential. The credential will be sent to the first host device through the server. The credential can be used to access the requested content if the credential is valid. | 2010-02-25 |
20100050242 | GRAPHICAL PASSWORD AUTHENTICATION BASED ON PIXEL DIFFERENCES - A password, unknown to a user to be authenticated by the password, is created by comparing an image provided by the user to a master image. Random differences between the images are found and used to create the password. The password is then validated to determine whether the user is authorized and/or to determine whether a communication provided by the user is to be processed. | 2010-02-25 |
20100050243 | METHOD AND SYSTEM FOR TRUSTED CLIENT BOOTSTRAPPING - Bootstrapping a trusted cryptographic certificate or other credentials into a client web browser application can be used to provide protection against “phishing” and “man-in-the-middle” attacks made over a computer network. Verification credentials are provided to users who connect directly to an authentication server and provide sufficient authentication information. The authentication server can rely upon the use of private URLs associated with each user as part of the verification process and can reject users who connect by clicking on a hyperlink directed to the authentication server. | 2010-02-25 |
20100050244 | Approaches for Ensuring Data Security - Techniques for protecting resources of a client from theft or unauthorized access. A BIOS agent stores policy data within a BIOS of the client. The BIOS agent is one or more software modules operating in the BIOS of the client. The policy data describes one or more security policies which the client is to follow. In response to the client following at least one of the one or more security policies, a persistent storage medium of the client is locked by instructing a controller of the persistent storage medium to deny, to any entity, access to data stored on the persistent storage medium unless the entity supplies, to the controller, a recognized authentication credential. In this way, a malicious user without access to the recognized authentication credential cannot access the data stored on the persistent storage medium, even if the persistent storage medium is removed from the client. | 2010-02-25 |
20100050245 | Systems and Methods to Provide Information and Services to Authorized Users - Systems and methods are provided to authorize users to anonymously access resources of different web sites. For example, a business listing service may authenticate users and allow the authenticated users to access the resources of the businesses listed via the business listing service, without the users having to create separate accounts with the businesses and without having to reveal the identities of the users to the businesses. | 2010-02-25 |
20100050246 | TRUSTING SECURITY ATTRIBUTE AUTHORITIES THAT ARE BOTH COOPERATIVE AND COMPETITIVE - A method and system for authorizing a user. The method comprises the steps of assigning a first role to a user in a first domain, assigning a second role in a second domain to the first role, and assigning access to a resource in the second domain to the second role. The method comprises the further steps of receiving a request from the user for the resource; and providing access to the resource, to the user. The invention may be employed by users and services to manage their interaction with those services, including configuring which they trust for what types of information, in what applications, and which subsets of information they can be trusted to provide. | 2010-02-25 |
20100050247 | AUTHENTICATION SYSTEM AND METHOD INCLUDING IMAGE FORMING APPARATUS - The present invention enables any authentication for a plurality of authentication methods with an authentication server for storing management data on a user. The present invention uses one of set information for logging in with an IC card and user input information from operation means in the case of logging in to a directory server; requests the directory server from a Kerberos authentication operation part for a service ticket; requests the directory server from an LDAP communication operation part for authentication with the service ticket obtained by the relevant request; and requests the directory server from the authentication processing functioning part for a search for granting use of the relevant MFP to a user with one of card information read by a card reader and a user name of user input information in the case where authentication to the directory server by the relevant request is successful. | 2010-02-25 |
20100050248 | NETWORK SURVEILLANCE - A method of network surveillance includes receiving network packets handled by a network entity and building at least one long-term and at least one short-term statistical profile from a measure of the network packets that monitors data transfers, errors, or network connections. A comparison of the statistical profiles is used to determine whether the difference between the statistical profiles indicates suspicious network activity. | 2010-02-25 |
20100050249 | PAYMENT CARD INDUSTRY (PCI) COMPLIANT ARCHITECTURE AND ASSOCIATED METHODOLOGY OF MANAGING A SERVICE INFRASTRUCTURE - A system to ensure compliance with data security standards for merchants that store, process, and transmit secure data, includes a security appliance having a global unit to monitor the functions of the security appliance, a logging unit to log data from network devices at the merchant's site and from other security appliance units, an integrity unit to construct maps of file systems of the network devices and to compare the constructed maps with previously constructed maps to detect differences between them, and a scanning unit to periodically scan the network to detect unrecognized devices on the network. The system further includes a display unit to provide compliance information on a secure basis, a back-end unit to automate and manage compliance-related tasks and data security events, and a control unit to monitor compliance performance in real-time and to implement required procedures to ensure compliance with data security standards. | 2010-02-25 |
20100050250 | INFORMATION PROCESSING DEVICE, DATA PROCESSING METHOD, AND PROGRAM - An information processing device includes: a local memory unit for storing data including an encrypted content; a memory for storing data including key information used to reproduce the encrypted content; and a data processing unit performing a process of writing data to the local memory unit and the memory, and a process of reproducing the encrypted content, wherein the data processing unit performs a process of writing encrypted content downloaded from a server or encrypted content copied from a medium to the local memory unit, and performs a process of decoding the encrypted content or a validity authenticating process using the data stored in the local memory unit and the data stored in the memory when reproducing the encrypted content written to the local memory unit. | 2010-02-25 |
20100050251 | SYSTEMS AND METHODS FOR PROVIDING SECURITY TOKEN AUTHENTICATION - Described herein are systems and methods for centralizing and standardizing implementation of security tokens so as to provide one token per one user for accessing business applications across an enterprise, providing scalability to support authentication of as many enterprise users as desired or needed, and providing a standardized token management interface that supports both pre-binding and post-binding user registration processes and different types of security token. | 2010-02-25 |
20100050252 | ROLE NAVIGATION DESIGNER AND VERIFIER - Systems and methods are provide for providing role navigation design and verification. An embodiment includes displaying user interface having at least one secured element, identifying a first privilege needed for access the secured element, and associating the privilege with a role, whereby a user having the role may access the at least one secured element. | 2010-02-25 |
20100050253 | SYSTEM AND METHOD FOR REAL WORLD BIOMETRIC ANALYTICS THROUGH THE USE OF A MULTIMODAL BIOMETRIC ANALYTIC WALLET - A system and method for real world biometric analytics through the use of a multimodal analytic wallet. The system includes a biometric wallet comprising a pervasive repository for storing biometric data, the pervasive repository including at least one of a biometric layer, a genomic layer, a health layer, a privacy layer, and a processing layer. The biometric wallet further comprises a biometric analytic interface configured to communicate the biometric data to one or more devices. | 2010-02-25 |
20100050254 | ASSOCIATING OPERATING SYSTEM NATIVE AUTHORIZATIONS WITH CONSOLE ROLES - Disclosed is a computer implemented method and apparatus to provide authorizations to an administrative user. An integrated solutions console (ISC) receives an administrative user login corresponding to a console administrative user. The ISC presents a list of at least one management task. The ISC presents at least one input interface to a display for an administrative user name and at least one console role. The ISC receives an administrative user name and a console role. The ISC obtains an authorization descriptor that can be used to couple the administrative user name and the console role. | 2010-02-25 |
20100050255 | DETECTION AND SUPPRESSION OF SHORT MESSAGE SERVICE DENIAL OF SERVICE ATTACKS - A method, system, and medium are provided for suppressing a Short Message Service (SMS) induced Denial of Service (DoS) attack on a telecommunications network. A register is updated to include information relevant to SMS messages that are requested to be communicated by way of a wireless telecommunications network. The register includes information of the location where the target devices of SMS messages are located. The register is utilized to detect an SMS induced DoS attack. A trigger is communicated to an SMS router to enable a DoS mode that restricts the communication of SMS messages. In an exemplary embodiment, only those SMS messages identified as part of the DoS attack are restricted. | 2010-02-25 |
20100050256 | METHODS AND SYSTEMS FOR INTERNET PROTOCOL (IP) PACKET HEADER COLLECTION AND STORAGE - A computer-based method for providing information about a potential security incident ascertained from received internet protocol (IP) packets is described. The method includes capturing IP packets from a computer network, stripping packet header data from the captured IP packets, reviewing the stripped packet header data for multiple occurrences of matching packet header data, and storing, in a database, only a single instance of packet header data for any reviewed packet header data that is determined to have occurred multiple times. | 2010-02-25 |
20100050257 | CONFIRMATION METHOD OF API BY THE INFORMATION AT CALL-STACK - The present invention relates to a method of verifying an API using information recorded in the call stack. In the API verification method, whether at least one application is executed is determined in a system in which the application is installed. An API function requested when the application is executed is hooked. Details of a call stack for the API function are output. A stack Database (DB), in which call stack details for various types of API functions required for operation of the application are stored, is searched for the output call stack details, and the output call stack details are checked. | 2010-02-25 |
20100050258 | LIGHTWEIGHT PACKET-DROP DETECTION FOR AD HOC NETWORKS - In packet-drop attacks in ad hoc networks, a malicious network node chooses to selectively drop packets that are supposed to be forwarded, which results in adverse impact on application good-put and network stability. A method and system for detection of packet-drop attacks in ad hoc networks requires network nodes to report statistics on IP flow packets originated, received, or forwarded to neighbors. These statistics are analyzed and correlated to determine nodes suspected of dropping packets. | 2010-02-25 |
20100050259 | SYSTEM AND METHOD FOR RADIO FREQUENCY INTRUSION DETECTION - A system to detect and analyze RF signals utilizes a data structure storing RF signatures indicating characteristics of known authorized and/or unauthorized RF transmissions. When an RF signal is detected, certain analysis characteristics are extracted from the RF signal and analyzed with respect to the stored RF signatures to determine whether the RF transmission is authorized or unauthorized. In the event of an unauthorized RF transmission, the system generates an alarm condition to alert the user to an RF intrusion and may further log data related to the intruder transmission. Known techniques may be used to determine the location of the RF intrusion within a defined area of operations. | 2010-02-25 |
20100050260 | Attack node set determination apparatus and method, information processing device, attack dealing method, and program - An attack node set determination apparatus obtains an event log basic parameter extracted from collected event logs and attribute information based on the event log basic parameter. The attack node set determination apparatus performs a clustering on a space having dimensions of part or all of the obtained attribute information and event log basic parameter, computes a cluster, and transmits information on the cluster and a countermeasure against the cluster to a firewall. Upon detecting an attack packet from an attack node set, the firewall identifies a cluster including the attack packet and conducts a countermeasure against the whole identified cluster. | 2010-02-25 |
20100050261 | TERMINAL AND METHOD OF PROTECTING THE SAME FROM VIRUS - A mobile terminal including a display module, a memory configured to store data, a wireless communication unit configured to wirelessly connect with at least one other terminal, a checking unit configured to check at least a portion of the stored data for virus-infected data infected with a virus, and a controller configured to prevent a wireless communication connection with the at least one other terminal when the checking unit finds virus-infected data infected with the virus. | 2010-02-25 |
20100050262 | METHODS AND SYSTEMS FOR AUTOMATED DETECTION AND TRACKING OF NETWORK ATTACKS - Methods for tracking attacking nodes are described and include extracting, from a database, an instance of each unique packet header associated with IP-to-IP packets transmitted over a time period. The method includes determining from extracted headers, which nodes have attempted to establish a connection with an excessive number of other nodes over a period, identifying these as potential attacking nodes, determining from the headers, which other nodes responded with a TCP SYN/ACK packet indicating a willingness to establish connections, and a potential for compromise. Nodes scanned by potential attacking nodes are disqualified from the identified nodes based on at least one of: data in the headers relating to at least one of an amount of data transferred, and scanning activities conducted by the nodes that responded to a potential attacking node with a TCP SYN/ACK packet. Any remaining potential attacking nodes and scanned nodes are presented to a user. | 2010-02-25 |
20100050263 | BROWSER BASED METHOD OF ASSESSING WEB APPLICATION VULNERABILITY - A novel and useful mechanism and method for assessing the vulnerability of web applications while browsing the application. As a user interacts with the web application, HTTP requests are sent from the browser to the web server. Each HTTP request is analyzed to determine if its associated elements need testing. Vulnerability assessment tests are sent to the server. Test results are then returned to the browser, where they are analyzed, displayed and/or stored in a log file. | 2010-02-25 |
20100050264 | Spreadsheet risk reconnaissance network for automatically detecting risk conditions in spreadsheet files within an organization - A spreadsheet risk reconnaissance network including a research agent installed on one or more spreadsheet file servers registered on the network, and a plurality of spreadsheet file servers for supporting a plurality of user organizations registered and communicating with a data processing center. Each research agent operates transparently to users on the network so as to perform a number of functions, including (i) collecting metadata from spreadsheet files stored on said spreadsheet file servers registered on said network, and (ii) transmitting the collected metadata to the data processing center for storage and analysis. The data processing center performs a number of operations, including (i) analyzing collected metadata associated with each spreadsheet file, (ii) calculating a spreadsheet risk measure based on objective-relative analysis, for a plurality of spreadsheet files associated with at least one user organization, under management by the network, and (iii) allowing business manager users to assign business attributes to identified spreadsheet files assigned the spreadsheet risk measure. | 2010-02-25 |
20100050265 | Method and Apparatus for Enhancing Security Between a Web Server and a PSTN-based Voice Portal - A security regimen is provided for implementing transaction security between a Web server and data and a voice portal system accessible through a telephony network on the user end and through an XML gateway on the data source end. The regimen includes one of a private connection, a virtual private network, or a secure socket layer, set-up between the Web server and the Voice Portal system through the XML gateway. Transactions carried on between the portal and the server enjoy the same security that is available between nodes on the data network. In one embodiment, the regimen further includes a voice translation system distributed at the outlet of the portal and at the telephone of the end user wherein the voice dialog is translated to an obscure language not that of the users language and then retranslated to the users language at the telephone of the user. | 2010-02-25 |
20100050266 | Providing Extended Memory Protection - In one embodiment, the present invention provides for extended memory protection for memory of a system. The embodiment includes a method for associating a protection indicator of a protection record maintained outside of an application's data space with a memory location, and preventing access to the memory location based on the status of the protection indicator. In such manner, more secure operation is provided, as malicious code or other malware is prevented from accessing protected memory locations. Other embodiments are described and claimed. | 2010-02-25 |
20100050267 | METHOD AND SYSTEM FOR THE AUTOMATED TRANSFORMATION OF ACCESS CONTROL MANAGEMENT INFORMATION IN COMPUTER SYSTEMS - A system for the automatic transformation of access control data between a source and a target is described. The system includes a source module comprising access control data for a first computing system, a target module comprising access control data for a second computing system, a source transformer module to create an access control matrix based on the access control data in the source module, and a target transformer module to convert the data from the access control matrix according to the access of the target module for the second computing system. | 2010-02-25 |
20100050268 | PASSWORD PROTECTION SYSTEM AND METHOD - A method, system, and device for password protection for a computer or other electronic device are provided, including providing one or more false passwords that outwardly cause the computer or other electronic device to behave as if a correct password was entered and that inwardly cause the computer or other electronic device to behave differently than as if the correct password was entered; and taking a predetermined action when one of the false passwords is entered. | 2010-02-25 |
20100050269 | INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND COMPUTER PROGRAM PRODUCT - Whether a combination method defined in an output rule satisfies a combination condition of each content specified in a play list is judged in order of priority defined in a priority list. Based on the judgment result, the output rule is edited in such a manner that the combination condition of each content specified in the play list is satisfied. The resources of the combination target contents specified in the play list are combined in accordance with the combination method of the edited output rule. | 2010-02-25 |
20100050270 | Control of Access to Content Received from a Multimedia Content Distribution Network - A disclosed method for controlling access to content provided by a multimedia content delivery network includes detecting a remote control signal, determining identification information and action information in the remote control signal, generating a CPE code based on a combination of the identification and action information, and performing a content control action based on the CPE code. The identification information may indicate a setting of a switch of the remote control device or a user of the remote control device. Generating the CPE code may include generating a first CPE code when the identification information indicates a first user and generating a different CPE code when the identification information indicates a second user. Generating the CPE code may still further include accessing parental control restrictions associated with a user or user class indicated by the identification information and generating a CPE code in compliance with the parental control restrictions. | 2010-02-25 |
20100050271 | MANAGING APPLICATIONS RELATED TO SECURE MODULES - An apparatus capable of hosting a secure module. The hosting apparatus is configured to provide connectivity to the secure module, and comprises a memory for storing secure module related applications. A processing module is configured to check whether an application chosen or activated by the user of the apparatus is a secure module related application. In case the chosen or activated application is a secure module related application, the processing module is 101 configured to restrict user rights concerning the application. | 2010-02-25 |
20100050272 | METHOD AND APPARATUS FOR HIERARCHICAL ASSIGNMENT OF RIGHTS TO DOCUMENTS AND DOCUMENTS HAVING SUCH RIGHTS - A system and method for distribution of digital works in a tree-like structure of devices. A hierarchical right may include a first usage right governing a use for the digital work and a first delegation right governing distribution of the digital work to child nodes of the tree-like structure. A second usage right and/or a second delegation right may be generated based on the hierarchical right, the second usage right governing a use for the digital work and the second delegation right governing distribution of the digital work to child nodes of a first child node of the tree-like structure. The second usage right and/or the second delegation right may be assigned to a version of the digital work, and the second usage right and/or the second delegation right and the version of the digital work may be forwarded to the first child node. | 2010-02-25 |
20100050273 | METHODS FOR PRE-POPULATING LOCAL URL RATING CACHE - A method and apparatus for improving the system response time when URL filtering is employed to provide security for web access. The method involves gathering the attributes of the user, and pre-populating a local URL-rating cache with URLs and corresponding ratings associated with analogous attributes from a URL cache database. Thus, the cache hit rate is higher with a pre-populated local URL rating cache, and the system response time is also improved. | 2010-02-25 |
20100050274 | CONTENT CONTROL SYSTEM - A content control system capable of controlling delivery destinations of user contents in respective groups, identifying each group through which each content is delivered, and delivering information/advertisements according to the attribution information of the content. In a content control server, group identifying information is set in each user content to be uploaded to or downloaded from a group memory area corresponding to a gateway ID from a terminal through a gateway having a plurality of its subordinate terminals. The information identifies each gateway through which each object content is delivered according to the gateway ID. The control system controls the delivery destination of each content according to the combination of the content delivery route and a table prepared in the content control server. | 2010-02-25 |
20100050275 | DEVICE THAT CAN BE RENDERED USELESS AND METHOD THEREOF - In one form a device having an integrated circuit is rendered useless by providing a piezo element coupled to a voltage terminal of the integrated circuit of the device. A render useless signal is generated by any of several ways. The piezo element, in response to the render useless signal, renders in any one of several ways the device to be rendered useless. The piezo element, when disturbed, generates a voltage which is provided to the voltage terminal of the integrated circuit, the voltage being sufficiently high to render useless at least a portion of the integrated circuit. In other forms the render useless signal renders MRAM circuitry within the device useless by moving a magnetic field across the MRAM circuitry to vary resistance of memory reference cells. In one form the magnetic field is moved by spring-loading or pivoting a magnet that is released by the piezo element. | 2010-02-25 |
20100050276 | Transgenic non-human animal models of apoptosis-mediated conditions - A transgenic non-human animal whose genome comprises a stable integration of a transgene that encodes at least one Fas-ligand protein operably-linked to a tetracycline-inducible promoter includes cells that express the transgene and undergo apoptosis. The transgenic non-human animal can be used to screen for compounds that inhibit apoptosis and to identify cells that are capable of differentiating in vivo. | 2010-02-25 |
20100050277 | KNOCKOUT ANIMAL EXHIBITING ANXIETY-LIKE BEHAVIOR - A vector for creating kf-1 gene knockout nonhuman animals exhibiting increased anxiety-like behaviors, and containing Lox-pM-M-kf-1[in3b]-kf-1[ex4a]-LoxP, | 2010-02-25 |
20100050278 | Application of Actin-Binding Protein to Disease Associated With Cell Motility - It is intended to identity a protein involved in a molecular mechanism between Akt and cell motility as well as to elucidate its function and find its application. In the present teachings, for achieving the above object, protein or partial peptide thereof containing an amino acid sequence identical or substantially identical to the amino acid sequence represented by SEQ ID: 2 is utilized in the screening of a compound or a salt thereof that activates or inhibits any of cell motility, cell migration and angiogenesis. | 2010-02-25 |
20100050279 | HIGH EFFICIENCY FLP SITE-SPECIFIC RECOMBINATION IN MAMMALIAN CELLS USING AN OPTIMIZED FLP GENE - The present invention provides an optimized FLP site-specific recombinase coding sequence and methods for its use. This genetically engineered FLP gene displays a marked increase in recombination efficiency compared to the native FLP gene and is therefore useful in a wide array of molecular applications. | 2010-02-25 |
20100050280 | RECOMBINANT CONSTRUCTS AND TRANSGENIC FLUORESCENT ORNAMENTAL FISH THEREFROM - The present invention relates to the method and use of reef coral fluorescent proteins in making transgenic red, green and yellow fluorescent zebrafish. Preferably, such fluorescent zebrafish are fertile and used to establish a population of transgenic zebrafish and to provide to the ornamental fish industry for the purpose of marketing. Thus, new varieties of ornamental fish of different fluorescence colors from a novel source are developed. | 2010-02-25 |
20100050281 | Identification of Genes and Their Products Which Promote Hybrid Vigour or Hybrid Debility and Uses Thereof - The present invention relates to a method of identifying candidate genes and the proteins encoded by them that are useful in the inducement of hybrid vigour, hybrid debility and/or the diagnosis, prognosis and treatment of disease. In particular, the present invention relates to a method for identifying candidate genes capable of producing hybrid vigour or hybrid debility in an animal or plant, comprising the steps of: (i) comparing the mRNA sequence of alleles of candidate genes isolated from an animal or plant which exhibits hybrid vigour or hybrid debility with the nucleotide sequences from the corresponding alleles isolated from the parents of said animal or plant; (ii) identifying mRNA sequence differences in the alleles from said animal or plant which exhibits hybrid vigour or hybrid debility which codes for amino acid sequence variation; and (iii) identifying that the amino acid sequence variation between alleles of the candidate gene in said animal or plant is encoded by mRNA sequences which are located within two or more different exons within the candidate gene. | 2010-02-25 |
20100050282 | Herbicide Tolerant Cotton Plants and Methods for Identifying the Same - The invention provides specific transgenic cotton plants, plant material and seeds, characterized in that these products harbor a specific transformation event at a specific location in the cotton genome. Tools are also provided which allow rapid and unequivocal identification of the event in biological samples. | 2010-02-25 |
20100050283 | SOYBEAN VARIETY D5236984 - The invention relates to the soybean variety designated D5236984. Provided by the invention are the seeds, plants and derivatives of the soybean variety D5236984. Also provided by the invention are tissue cultures of the soybean variety D5236984 and the plants regenerated therefrom. Still further provided by the invention are methods for producing soybean plants by crossing the soybean variety D5236984 with itself or another soybean variety and plants produced by such methods. | 2010-02-25 |
20100050284 | SOYBEAN VARIETY D5232543 - The invention relates to the soybean variety designated D5232543. Provided by the invention are the seeds, plants and derivatives of the soybean variety D5232543. Also provided by the invention are tissue cultures of the soybean variety D5232543 and the plants regenerated therefrom. Still further provided by the invention are methods for producing soybean plants by crossing the soybean variety D5232543 with itself or another soybean variety and plants produced by such methods. | 2010-02-25 |
20100050285 | SOYBEAN VARIETY D5689411 - The invention relates to the soybean variety designated D5689411. Provided by the invention are the seeds, plants and derivatives of the soybean variety D5689411. Also provided by the invention are tissue cultures of the soybean variety D5689411 and the plants regenerated therefrom. Still further provided by the invention are methods for producing soybean plants by crossing the soybean variety D5689411 with itself or another soybean variety and plants produced by such methods. | 2010-02-25 |
20100050286 | SOYBEAN VARIETY D5897564 - The invention relates to the soybean variety designated D5897564. Provided by the invention are the seeds, plants and derivatives of the soybean variety D5897564. Also provided by the invention are tissue cultures of the soybean variety D5897564 and the plants regenerated therefrom. Still further provided by the invention are methods for producing soybean plants by crossing the soybean variety D5897564 with itself or another soybean variety and plants produced by such methods. | 2010-02-25 |
20100050287 | SOYBEAN VARIETY D5567891 - The invention relates to the soybean variety designated D5567891. Provided by the invention are the seeds, plants and derivatives of the soybean variety D5567891. Also provided by the invention are tissue cultures of the soybean variety D5567891 and the plants regenerated therefrom. Still further provided by the invention are methods for producing soybean plants by crossing the soybean variety D5567891 with itself or another soybean variety and plants produced by such methods. | 2010-02-25 |
20100050288 | SOYBEAN VARIETY D5864369 - The invention relates to the soybean variety designated D5864369. Provided by the invention are the seeds, plants and derivatives of the soybean variety D5864369. Also provided by the invention are tissue cultures of the soybean variety D5864369 and the plants regenerated therefrom. Still further provided by the invention are methods for producing soybean plants by crossing the soybean variety D5864369 with itself or another soybean variety and plants produced by such methods. | 2010-02-25 |
20100050289 | SOYBEAN VARIETY D5789653 - The invention relates to the soybean variety designated D5789653. Provided by the invention are the seeds, plants and derivatives of the soybean variety D5789653. Also provided by the invention are tissue cultures of the soybean variety D5789653 and the plants regenerated therefrom. Still further provided by the invention are methods for producing soybean plants by crossing the soybean variety D5789653 with itself or another soybean variety and plants produced by such methods. | 2010-02-25 |
20100050290 | SOYBEAN VARIETY D5462579 - The invention relates to the soybean variety designated D5462579. Provided by the invention are the seeds, plants and derivatives of the soybean variety D5462579. Also provided by the invention are tissue cultures of the soybean variety D5462579 and the plants regenerated therefrom. Still further provided by the invention are methods for producing soybean plants by crossing the soybean variety D5462579 with itself or another soybean variety and plants produced by such methods. | 2010-02-25 |
20100050291 | GENETIC LOCI ASSOCIATED WITH HEAD SMUT RESISTANCE IN MAIZE - Head smut is one of the most devastating diseases in maize, causing severe yield loss worldwide. The present invention describes the fine-mapping of a major QTL conferring resistance to head smut. Markers useful for breeding, and methods for conferring head smut resistance are described. Nucleic acid sequence from the genetic locus conferring head smut resistance is disclosed. Genes encoding proteins conferring head smut resistance are disclosed. | 2010-02-25 |
20100050292 | Galactosyltransferase - The invention discloses DNA molecules encoding galactosyltransferases, recombinant host cells, tissues or organisms comprising dysfunctional galactosyltransferase gene(s), recombinant host cells, tissues or organisms comprising an introduced functional galactosyltransferase gene, methods for the production of proteins therewith, methods for the production of galactosyltransferase and vectors and uses thereof. | 2010-02-25 |
20100050293 | IMPROVEMENT OF NITROGEN RESPONSIVENESS IN PLANTS THROUGH THE EXPRESSION OF PATHWAYS FOR THE FORMATION AND CATABOLISM OF NOVEL N-RICH COMPOUNDS - The invention provides for the regulation of opine synthesis and catabolism providing improved nitrogen responsiveness, utilizing opine synthase and oxidase nucleic acids and their encoded proteins. The present invention provides methods and compositions relating to altering nitrogen utilization and/or uptake in plants. The invention further provides recombinant expression cassettes, host cells, and transgenic plants. | 2010-02-25 |
20100050294 | METHOD FOR MODIFYING INSECT RESISTANCE OF PLANTS BY UTILIZING RNAI TECHNIQUE - A method for improving insect resistance of plants, in which dsRNA of insect's gene is expressed in plants by using transgenic technique, and then the interfering RNAs are formed in the plants. The interfering RNAs then enter into insects' bodies after being ingested by the insect that eats the plant, and conduct RNA interference against the target gene, thereby expression of the target gene is suppressed by RNA interference. A new plant-mediated method for improving insect resistance by suppressing the growth of insects by RNA interference mechanism. | 2010-02-25 |
20100050295 | METHODS AND MEANS FOR REMOVAL OF A SELECTED DNA SEQUENCE - Alternative and/or improved methods are described for the exact removal of a selected subfragment from a DNA molecule by intrachromosomal recombination between two directly repeated DNA sequences using a rare-cleaving double stranded break inducing DNA endonuclease expressed under control of a micro-spore specific promoter. These methods can be applied for the exact exchange of a target DNA fragment for a DNA fragment of interest in plant cells and plants. | 2010-02-25 |
20100050296 | Preparation of organisms with faster growth and/or higher yield - A method for preparing a nonhuman organism with faster growth and/or increased yield in comparison with a reference organism, with method comprises increasing the activity of SEQ ID NO: 2, 107, 125, 129 or 137 in said organism or in one or parts thereof in comparison with a reference organism. | 2010-02-25 |
20100050297 | PLANTS HAVING MODIFIED GROWTH CHARACTERISTICS AND METHOD FOR MAKING THE SAME - The present invention concerns a method for modifying the growth characteristics of plants by modulating expression in a plant of a nucleic acid sequence encoding a TAD protein and/or modulating activity in a plant of a TAD protein. The invention also relates to transgenic plants having modified growth characteristics, which plants have modulated expression of a nucleic acid encoding a TAD protein fragment. | 2010-02-25 |
20100050298 | MUTANTS OF PHA SYNTHASE FROM PSEUDOMONAS SP. 6-19 AND METHOD FOR PREPARING LACTATE HOMOPOLYMER OR COPOLYMER USING THE SAME - The present invention relates to polyhydroxyalkanoate synthase (PHA synthase) mutant originated from | 2010-02-25 |
20100050299 | POST-HARVEST TREATMENT OF FRUITS WITH AN ANTIFUNGAL COMPOSITION - The present invention relates to the treatment of wounds occurring from cutting bananas and pineapples from a tree with a composition containing natamycin and at least one phosphite containing compound. | 2010-02-25 |
20100050300 | METHODS FOR REMOVAL OF SPECIFIC SEED TISSUE OR STRUCTURE FOR SEED ANALYSIS - A method for reducing resources for selecting seed to be produced in commercial quantities or for research is disclosed. Samples of seed which are candidates for selection are collected and given an identifier. Specific tissue or structure from candidate seed is removed. A test or analysis is performed on the candidate seed or the removed tissue or structure. Results of the test or analysis are recorded and correlated to the seed's identifier. The results are evaluated and a decision is made whether to select a candidate seed for commercial production or for research. Time, space, and labor associated with growing plants in an experimental plot or greenhouse and taking tissue samples from growing plants is saved. | 2010-02-25 |
20100050301 | SYSTEM FOR CAPTURING AND MODIFYING LARGE PIECES OF GENOMIC DNA AND CONSTRUCTING VASCULAR PLANTS WITH SYNTHETIC CHLOROPLAST GENOMES - Vectors capable of stable replication in yeast and bacteria and comprising all essential genes of vascular plant plastids are provided as well as the use of such vectors to construct an recombinant plastid genome and host cells transformed with said vectors and recombinant plastid genomes. | 2010-02-25 |
20100050302 | NUCLEIC ACID SEQUENCES FROM CYANIDIUM CALDARIUM AND USES THEREOF - Expressed Sequence Tags (ESTs) isolated from the unicellular red algae, | 2010-02-25 |
20100050303 | Antimicrobial Agents from Microbial Genomes - We describe a method for mining microbial genomes to discover antimicrobial genes and proteins having broad spectrum of activity. Also described are antimicrobial genes and their expression products from various microbial genomes that were found using this method. The products of such genes can be used as antimicrobial agents or as tools for molecular biology. | 2010-02-25 |
20100050304 | BROWN MIDRIB SUDANGRASS HYBRIDS WITH IMPROVED FORAGE QUALITY - The invention provides sudangrass inbred and hybrid plants having adaptation, productivity, and disease resistance with reduced lignin concentration, reduced cell wall concentration, and improved digestibility. Plants and plant parts of the invention are useful in the efficient production of meat and milk due to improved whole plant and fiber digestibility. | 2010-02-25 |
20100050305 | WAXFLOWER PLANT NAMED 'MATILDA' - ‘Matilda’ is a new and distinct waxflower plant (interspecific | 2010-02-25 |
20100050306 | Bermudagrass 'ST-5' - Bermudagrass ‘ST-5’ is provided. The new and distinct dwarf variety has excellent shade tolerance, superior tawny mole cricket non-preference, small seed heads, and thrives in hot and humid conditions. The asexually reproduced triploid variety is reliably propagated vegetatively. | 2010-02-25 |
20100050307 | Agapanthus orientalis plant named 'PMN06' - ‘PMN06’ is a distinctive variety of | 2010-02-25 |