09th week of 2009 patent applcation highlights part 64 |
Patent application number | Title | Published |
20090055887 | PRIVACY ONTOLOGY FOR IDENTIFYING AND CLASSIFYING PERSONALLY IDENTIFIABLE INFORMATION AND A RELATED GUI - Method and system of providing an association between a system's meta-tagged data objects and a list of terms, the association indicating which objects are and are not covered by a given policy, in one aspect, may comprise obtaining a list of terms and a policy that includes one or more of the terms; identifying a plurality of meta-tags used in a system; developing one or more mappings between the terms and the meta-tags; identifying system data objects in the system having one or more meta-tags; creating for each meta-tag of each system data object identified, an association between the system data object and the one or more terms to which the meta-tag is mapped, the association indicating whether the system data object is or is not covered by the policy. | 2009-02-26 |
20090055888 | Self identifying services in distributed computing - A service policy is modified for a service in a distributed computing environment having a service oriented architecture. A client is notified of the modified service policy without use of a service registry. | 2009-02-26 |
20090055889 | System and method for detecting and mitigating the writing of sensitive data to memory - Disclosed is a system and method for detecting and mitigating the writing of sensitive or prohibited information to memory or communication media. The method includes detecting if an application is to write data to a memory, rerouting the writing of that data, and scanning the data for sensitive content or prohibited information. The scanning is done in accordance with one or more information security policies. If sensitive information is detected, the system has the option of issuing an alarm and/or preventing the sensitive information from being written, depending on the security policy. If the system permits the sensitive information to be written to memory, the system may spawn a file watcher object, which waits for a specified amount of time and then checks to see if the sensitive information has been deleted. If not, the system may issue an alarm or erase the sensitive information, depending on the security policy. | 2009-02-26 |
20090055890 | SYSTEM AND METHOD FOR SECURITY PLANNING WITH HARD SECURITY CONSTRAINTS - A method for security planning with hard security constraints includes: receiving security-related requirements of a network to be developed using system inputs and processing components; and generating the network according to the security-related requirements, wherein the network satisfies hard security constraints. | 2009-02-26 |
20090055891 | DEVICE, METHOD, AND PROGRAM FOR RELAYING DATA COMMUNICATION - A device, method and computer program product for relaying data communication between a client and a server. A proxy device for relaying data communication between a client and a server includes a receiving unit for receiving an access request directed to the server from the client, a determining unit for determining whether transfer of a response of the server to the access request to the client will take and amount of time equal to or longer than a threshold time period, a dummy message responding unit for sending, in response to a determination result indicating that the transfer of the response will take an amount of time equal to or longer than the threshold time period, a dummy response message for notifying the client that the response of the server will be sent to the client when the response becomes available for transfer, and a transferring unit for transferring, upon the response of the server becoming transferable to the client, the response to the client. | 2009-02-26 |
20090055892 | AUTHENTICATION METHOD AND KEY DEVICE - The present invention discloses an authentication method and a key device and relates to the information security field. The authentication method comprises initiating user authentication, generating a dynamic code and then a first verification code on the basis of the dynamic code, and outputting the dynamic code, by a key device; and receiving a second verification code entered by a user via a host, and collating the second verification code with the first verification code, by the key device, and if a match is found, the user access is authorized to the key device; otherwise, the user access is prohibited. The key device comprises a trigger module, a generator module, an output module, a communication module, a collator module, a controller module and a security module. According to the present invention, better security is achieved by reducing the possibility of sensitive information disclosure and misuse in case of password theft for the key device. | 2009-02-26 |
20090055893 | METHOD AND SYSTEM FOR IMPLEMENTING A DYNAMIC VERIFICATION VALUE - A method is disclosed, which includes receiving a message including an account identifier and a first verification value. The method uses the account identifier to select a dynamic verification value process from at least two dynamic verification value processes. Then, using the selected dynamic verification value process, a second verification value is determined. Next, the method determines if the first verification value and the second verification value match or are within an expected range. | 2009-02-26 |
20090055894 | METHOD AND SYSTEM FOR PROVIDING ONLINE RECORDS - A method for providing a user with the ability to access and collect legal records associated with the user includes assigning a phone number to the user for fax and voice communications from a legal services provider, associating access information with the user for the user to use to access a secure web site, providing the user with a document to provide to the legal services provider exercising rights of the user for access to the legal records, the document requesting the legal services provider to send the legal records to the phone number, receiving a private fax communication comprising a legal record associated with the consumer for which the consumer has requested and given permission to the legal services provider to send, converting the private fax communications into an image file format, storing the legal services record encoded in the image file format, and providing the user with secure access to the web site using the access information and providing on the web site an interface to the legal records of the user for the user to access the legal record. | 2009-02-26 |
20090055895 | Method and Apparatus for a Non-Revealing Do-Not-Contact List System - A method and apparatus for a non-revealing do-not-contact list system in which a do-not-contact list of one-way hashed consumer contact information is provided to a set of one or more entities. The set of entities determine whether certain consumers wish to be contacted with the do-not-contact list without discovering actual consumer contact information. | 2009-02-26 |
20090055896 | NETWORK CONNECTION CONTROL PROGRAM, NETWORK CONNECTION CONTROL METHOD, AND NETWORK CONNECTION CONTROL SYSTEM - The present invention prevents a computer, which is infected by an unauthorized program such as a virus or spyware when the computer is brought out, from being connected with a secure network such as an intracompany LAN. When a user terminal is started, a connection with the intracompany LAN is attempted. Then, a network connection is temporarily stopped and an environment is compared with the one where the user terminal operated at a previous time. When there is no difference between both of the environments, the connection with the intracompany LAN is restored. However, when it is determined that the user terminal is connected with a network other than the intracompany LAN when the user terminal was operated at a previous time, an inspection for a virus or the like is executed by a USB memory where the latest anti-virus software is stored. After it is confirmed that the user terminal is safe, the connection with the intracompany LAN is restored. | 2009-02-26 |
20090055897 | SYSTEM AND METHOD FOR ENFORCING NETWORK DEVICE PROVISIONING POLICY - Systems and methods are provided for enforcing a network device provisioning policy. In one embodiment, a method may employ a computer based system to restrict access to data center resources, receive provisioning requests for access to the data center resources, authorize the provisioning requests after compliance with the network provisioning policy and allow the network device to access authorized data center resources. In another embodiment, a system includes interfaces for provisioning policy, request and task status information. The information provided by these interfaces is then used to determine compliance with applicable network device provisioning policies and restrict or allow access to the data center resources according to the provisioning policy. | 2009-02-26 |
20090055898 | PANA for Roaming Wi-Fi Access in Fixed Network Architectures - A network component comprising at least one processor configured to implement a method comprising deriving a Master Session Key (MSK) using a secret key and at least one parameter obtained from an Extensible Authentication Protocol (EAP) sequence, deriving a first Pairwise Master Key (PMK) and a second PMK from the MSK, authenticating with a home gateway (HG) using the first PMK, and authenticating with an end point using the second PMK. Included is an apparatus comprising a node comprising an access controller (AC) and a protocol for carrying authentication for network access (PANA) Authentication Agent (PAA), wherein the AC is configured to manage authentication for a UE, and wherein the PAA is configured to implement a PANA to forward authentication information related to the UE. | 2009-02-26 |
20090055899 | METHOD AND APPARATUS FOR OPTIMIZATION OF SIGCOMP UDVM PERFORMANCE - A mobile communication system that utilizes multiple access technologies achieves multiple session registrations by deriving a plurality of extended unique device identifications from a specific unique device identification (e.g., private user identification (PIID) stored on a subscriber identity module (SIM)) assigned to a user equipment. Each of the plurality of extended unique device identifications have the benefit of allowing multiple registrations with one or more access networks while allowing a home subscriber system to detect the one unique device identification embedded in the extended unique device identifications for authentication purposes. Thereby, a large population of deployed UEs and access network infrastructure may benefit without replacement by allowing a UE to maintain session continuity when transitioning between access networks, to select a preferred access technology when in overlapping coverage areas without session interruption, or to maintain multiple sessions (e.g., simultaneous Voice over IP (VoIP) and media streaming) with different access networks. | 2009-02-26 |
20090055900 | ENTERPRISE WIRELESS LOCAL AREA NETWORK (LAN) GUEST ACCESS - In one embodiment, detecting a wireless network access request, forwarding data associated with the detected wireless network access request to a first multipoint Generic Routing Encapsulation (mGRE) tunnel, receiving authentication information associated with the detected wireless network access request, receiving authentication status information for the detected wireless network access request, and forwarding data associated with the detected wireless network access request to a second multipoint Generic Routing Encapsulation (mGRE) tunnel connected to a predetermined internet protocol (IP) subnet when the received authentication status information includes a successful authentication, are provided. | 2009-02-26 |
20090055901 | De-Centralization Of Group Administration Authority - An embodiment of a network manager permits a resource group administrator (with resource group level permissions but without global permissions) to add a global object to his/her resource group as a managed object, without requiring the administrator to have a global permission, as discussed further below. An embodiment of the network manager permits a resource group administrator to also edit the configuration settings that are attached to his/her resource group without requiring the administrator to have a global permission. | 2009-02-26 |
20090055902 | SECURE DELEGATION USING PUBLIC KEY AUTHENTICATION - A client is impersonalized to a plurality of servers using a middle-tier server. A common nonce associated with each of the plurality of servers is obtained and the common nonce is provided to the client. The common nonce signed by the client is received at the middle-tier server and provided as a signature for transactions from the client to the plurality of servers so as to authenticate the client to the plurality of servers. | 2009-02-26 |
20090055903 | INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING APPARATUS, AND INFORMATION PROCESSING METHOD - The present invention provides an information processing system, an information processing apparatus, and an information processing method, capable of reducing a load of user authentication on a user, when a specific operation is performed using a plurality of apparatuses. In an embodiment of the present invention, an authentication server searches a device group corresponding to devices identified by device identification information transmitted to the authentication server, and searches a workflow. Subsequently, the authentication server judges whether or not a workflow in operation exists, and, if exists, does not instruct password input but directly instructs device processing. | 2009-02-26 |
20090055904 | Distributed Authentication System and Distributed Authentication Method - [Subject] In a distributed authentication system, if a terminal including a plurality of communication devices changes a communication device to another communication device during using a service, the service under use can be used in succession, and the number of times for execution by the user can reduced. | 2009-02-26 |
20090055905 | ACCESS CONTROL LIST CHECKING - Method and system for dynamically checking an access control list during the data transfers between a client web browser and a web server. The method and system allow checking of access control list by an application firewall, independent from the web application. The rules, upon which the checking is based, can be easily updated without affecting the web application. | 2009-02-26 |
20090055906 | METHOD AND APPARATUS FOR EMBEDDED MEMORY SECURITY - A method and apparatus for protecting data in a memory block from unauthorized access. When writing or reading data to or from the memory block an error correction code (ECC) is used to calculate an ECC value, wherein the calculation of the ECC value is based on a combination of the data and a password provided to the memory block prior to reading or writing. In case the calculated ECC value does not match a stored ECC value a write or read error is signalled to the device requesting the operation. | 2009-02-26 |
20090055907 | Authentification Broker for the Securities Industry - Identity-independent authentication tokens enable issuance of a single strong credential that can be mapped to an individual at each of multiple accounts within the online world. An issuer generates one or more authentication tokens for issuance to individuals or other entities. In some instances, each of these authentication tokens comprises a unique serial number. The individual or other entity may then request an authentication token from the issuer. The issuer may then issue the token to the individual without the need to ask or require the individual to identify his or herself. The individual may then map this issued authentication token to the individual's password at each of the individual's online accounts. | 2009-02-26 |
20090055908 | Apparatus and method for accessing user cookies between network domains - Multiple network domains may be grouped together. One network domain may represent a primary domain, while one or more additional network domains may represent secondary domains. User cookies associated with users may be stored in the primary domain. When a user attempts to access the primary domain, the primary domain may retrieve and use the user cookie to log the user into the primary domain. When a user attempts to access a secondary domain, the secondary sends a request to the primary domain. The primary domain sends the user cookie or related information (such as a token) to the secondary domain, which uses the user cookie or related information to log the user into the secondary domain. In addition, an active session between the user and one of the network domains can be transferred to another network domain. | 2009-02-26 |
20090055909 | DATA TRANSMITTING METHOD WITH MULTIPLE TOKEN MECHANISM IN WIRELESS TOKEN RING PROTOCOL - A data transmission method with multiple token mechanism in wireless token ring protocol is provided. First, (a) a logical ring with M nodes is provided; (b) a k-th node is selected from the logical ring, and a token in the k-th node is generated; (c) a first message is sent to a (k+1)-th node from the k-th node with the token, and whether the (k+1)-th node responds a second message is judged, if yes, the data to be transmitted is transmitted from the k-th node, otherwise, the token of the k-th node is eliminated; (d) the token is sent to the (k+1)-th node from the k-th node after completing the transmission of the transmitted data of the k-th node, a generation token sequence is generated in a i-th node, and sent to a (i−1)-th node; and (e) the token is generated for the (i−1)-th node with the generation token sequence. | 2009-02-26 |
20090055910 | SYSTEM AND METHODS FOR WEAK AUTHENTICATION DATA REINFORCEMENT - This document discusses, among other things, a system and methods for weak authentication data reinforcement. In an example embodiment, authentication data is received in a request to authenticate a user. In response to authentication being detected to be weak authentication data, it may be determined whether the request to authenticate is associated with a human user. An example embodiment may include initiating an authentication process based on determining that the request to authenticate is associated with the human use. | 2009-02-26 |
20090055911 | METHOD FOR COMPUTING THE ENTROPIC VALUE OF A DYNAMICAL MEMORY SYSTEM - Methods, devices, and systems are provided for optimizing the dissemination of information in various types of systems such as an access control system. More specifically, there are provided various mechanisms to increase the efficiency with which system updates and other types of information are spread throughout an access control system having at least one non-networked reader. | 2009-02-26 |
20090055912 | USER AUTHENTICATION SYSTEM USING IP ADDRESS AND METHOD THEREOF - A method for authenticating a user by IP address check includes: receiving a URL and a session cookie from a client; determining whether or not an IP address of the client has been changed based on the session cookie; resetting the session cookie, if the IP address has been changed, by adding the changed IP address as a temporary IP address thereto; determining whether or not the URL is required to perform IP address check; requesting a re-login to the client if it is determined that the URL is required to perform IP address check; and adding the temporary IP address to a valid IP address list for the user if the re-login is successful. | 2009-02-26 |
20090055913 | Method for Secure Transmittal of PINs Over Telecommunications Networks - A method and facilitator system ( | 2009-02-26 |
20090055914 | SOFTWARE UPDATE METHOD - A method of updating first software in at least one apparatus in which a first password is set and which determines, when receiving a second password and second software, whether or not the received second password matches the first password set in the apparatus and whether or not the received second software is for the apparatus, when the second password matches the first password and the second software is for the apparatus. The method includes; causing a user to select the apparatus from among a plurality of apparatuses; causing the user to input the second password; causing the user to designate an update file pertaining to the second software; storing information of the apparatus selected by the user, the second password input by the user and the update file designated by the user; and performing update processing to transmit the second password and the second software in the update file to the apparatus selected by the user in accordance with the stored information. | 2009-02-26 |
20090055915 | SYSTEMS AND METHODS FOR UNIVERSAL ENHANCED LOG-IN, IDENTITY DOCUMENT VERIFICATION, AND DEDICATED SURVEY PARTICIPATION - Systems and methods are provided for controlling access via a computer network to a subscriber server. A log-in server receives a query to connect through the computer network to the subscriber server, and the log-in server receives registrant identification data. A first session is established between the log-in server and the subscriber server to validate the registrant identification data, and to generate a session password. A second session is established between the log-in server and the subscriber server. The second session is configured to authorize, based in part on the registrant identification data, access to at least a portion of a website associated with the subscriber server. | 2009-02-26 |
20090055916 | SECURE DELEGATION USING PUBLIC KEY AUTHENTICATION - A client is impersonalized to a plurality of servers using a middle-tier server. A common nonce associated with each of the plurality of servers is obtained and the common nonce is provided to the client. The common nonce signed by the client is received at the middle-tier server and provided as a signature for transactions from the client to the plurality of servers so as to authenticate the client to the plurality of servers. | 2009-02-26 |
20090055917 | Authentication method and authentication system using the same - An authentication method is provided in which authentication is performed between terminals respectively belonging to a first realm and a second realm that is different from the first realm, with using a Kerberos authentication method. In order to obtain authentication with a terminal belonging to the second realm, a terminal belonging to the first realm requests a ticket granting ticket for accessing a key distribution center in the second realm, from a key distribution center in the first realm. The key distribution center in the first realm transmits an encrypted IP address of the key distribution center in the second realm together with the requested ticket granting ticket, to the terminal belonging to the first realm. | 2009-02-26 |
20090055918 | METHOD OF MUTUALLY AUTHENTICATING BETWEEN SOFTWARE MOBILITY DEVICE AND LOCAL HOST AND A METHOD OF FORMING INPUT/OUTPUT (I/O) CHANNEL - A method of mutually authenticating between a local host and a software mobility device including an operating system virtualization layer, and a method of forming an input/output (I/O) channel. The method of authenticating a local host in the software mobility device includes requesting a certificate from the local host in which an integrity value of the local host is stored, and receiving the certificate from the local host; receiving an integrity value measured in the local host and comparing the measured integrity value with the integrity value included in the certificate to verify the local host; and when the local host is verified, encrypting a security profile of the software mobility device and transmitting the encrypted security profile to the local host so as to provide secure communication between the local host and the software mobility device. | 2009-02-26 |
20090055919 | Unauthorized communication detection method - According to an aspect of an embodiment, a method for controlling an apparatus for transferring data from a plurality of first devices to a second device via a network, the data being transferred by using a packet, comprises the steps of: extracting type information identifying type of software conveyed by a packet and destination information identifying destination of the packet transmitted from one of the first devices; counting the number of kinds of the type information extracted from packets associated with the same destination information, respectively; and determining an unauthorized communication when the number of kinds of the type information is less than a predetermined value. | 2009-02-26 |
20090055920 | Systems And Methods For Establishing A Communication Session Among End-Points - Systems and methods for establishing a communications session among end-points are shown and described. The method can include receiving, from a client computing device at a gateway computing device, a request to establish a communication session with an end-point, the client computing device executing a program that locates address information for the end-point within application output displayed at the client computing device and forwarding at least a portion of the received request to a private branch exchange in communication the gateway computing device, the at least a portion of the received request including the address information of the end-point and address information associated with an end-user of the client computing device. | 2009-02-26 |
20090055921 | FILE ACCESS IN MULTI-PROTOCOL ENVIRONMENT - Aspects of the subject matter described herein relate to providing file access in a multi-protocol environment. In aspects, a file server is operable to receive requests formatted according to two or more file access protocols. If a request is formatted according to a first file access protocol, the file server applies access rights associated with the file to an account associated with a requester to determine whether to grant access. If the request is formatted according to the second file access protocol, the file server may first attempt to find an account for the requester. If an account is not found, the file server may then grant access based on access rights associated with the file as applied to information in the request without consulting an account on the file server. | 2009-02-26 |
20090055922 | Method and Apparatus for Enabling Content to be Shared Among Multiple Devices in a Secure Environment - A Master device (e.g., a SIM card) is configured with information regarding one or more Slave devices (e.g., SIM cards) that are associated with the Master device. The Master device is installed in a user device that receives content files and access and usage rights from a content provider. The Master device identifies one or more Slave devices that are associated with the Master device and transmits content files and the rights data to the Slave devices. A user device in which a Slave device is installed receives the content files and rights data sent by the Master device. The Slave device extracts a key from the rights data and provides the key to a decryption component of the user device, which uses the key to decrypt the content file. | 2009-02-26 |
20090055923 | Operation system login method and electronic device using the same - An operating system login method and an electronic device using the same are provided. The operating system login method comprises the following steps. Firstly, a facial characteristic of a user is captured. Next, whether the facial characteristic of the user is stored in a database is determined. If the facial characteristic is stored in the database, then a login user's account number and password are automatically read from the database. Then, whether the login user's account number and password pass verification is determined. If the user's account number and password pass verification, then the user is allowed to login the operating system. | 2009-02-26 |
20090055924 | Trusted records using secure exchange - A secure method and apparatus for data exchange that allows a client's or patient's financial data, medical records, and other information to be stored on a card-shaped compact disk, with multiple levels of encryption to preserve privacy. The trusted record disc can be read on any computer with a network or internet connection, but access to the information on the disc is restricted according to a password protected hierarchical encryption policy. In order to obtain access to the restricted information, an individual user needs to enter a unique password that is sent to a central server. The server confirms the password and returns an electronic key to the user's computer. The electronic key unlocks the encryption and allow the user to view only the information that is permitted (under federal patient, financial privacy or other laws). Thus, in the medical setting, physicians can review the patient's entire medical record and make changes to it. Nurses, pharmacists, and billing clerks have differing predetermined levels of access. | 2009-02-26 |
20090055925 | IMAGE FORMING APPARATUS, METHOD FOR MANAGEMENT OF AUTHENTICATING INFORMATION AND COMPUTER READABLE MEDIUM STORING PROGRAM THEREOF - An information forming apparatus includes: a communication unit that carries out data communication with an authentication card inserted into a card slot; an authentication unit that authenticates that a user who attempts to operate the apparatus is an authorized user by sending entered authenticating information to the authentication card; a storing unit that stores the entered authenticating information; and a process execution unit that, when a process is invoked that requires input of authenticating information to the authentication card, executes the process using the authenticating information stored in the storing unit. | 2009-02-26 |
20090055926 | MANAGEMENT APPARATUS, MANAGEMENT METHOD AND RECORDING MEDIUM STORING PROGRAM - A management apparatus which includes: a receiving unit that receives first authorization information for a first document that is already issued and contains document identification information identifying at least one document for which it is possible to issue authorization information and an issuance request requesting that second authorization information for a second document be issued; a verifying unit that verifies authenticity of the first authorization information that is received by the receiving unit; a checking unit that, in a case where the authenticity of the first authorization information is verified, checks whether or not document identification information identifying the second document is included in the first authorization information; and an issuing unit that, in a case where the document identification information identifying the second document is included in the first authorization information, issues the second authorization information. | 2009-02-26 |
20090055927 | Networked Computer System with Reduced Vulnerability to Directed Attacks - An attacker is prevented from obtaining information about the configuration of a computer system. Each of one or more revealing content elements that may be found in outgoing data transmitted by the computer system and that are capable of being used by the attacker to obtain the information about the configuration of the computer system is associated with one or more respective replacement content elements. Outgoing data to be transmitted by the computer system are then scanned for these one or more revealing content elements. A revealing content element found in the outgoing data is replaced by a replacement content element from the one or more replacement content elements associated with that revealing content element. This is done before the outgoing data is transmitted. | 2009-02-26 |
20090055928 | METHOD AND APPARATUS FOR PROVIDING PHISHING AND PHARMING ALERTS - Provided is an Internet information security technique, and more particularly, a method for alerting a user that a connected web site is a phishing site by comparing connected web site information with normal site information. | 2009-02-26 |
20090055929 | Local Domain Name Service System and Method for Providing Service Using Domain Name Service System - Provided is a local domain name system for querying an external server for a client-requested domain name and providing desired data to a user. A determination is made as to whether a special policy is to be applied to a client-input query through a test task. When a special policy is to be applied to the query, the special policy is performed to provide additional service to the client. | 2009-02-26 |
20090055930 | Content Security by Network Switch - A security switch detects whether requested content is either trusted content or non-trusted content. In case of network content being trusted content, network traffic bypasses the inspection gateway and goes directly to the user. If network content is non-trusted content, network traffic passes through to the inspection gateways for inspection. Additionally, when the security switch receives a reply for “trusted” content requests, it parses the reply information to verify that the content-type of the file is indeed “trusted”. If the file doesn't prove to be “trusted”, the security switch drops the connection and stops the suspected content from reaching the client. | 2009-02-26 |
20090055931 | DEVICE AND METHOD FOR DETECTING VULNERABILITY OF WEB SERVER USING MULTIPLE SEARCH ENGINES - Provided are a web server vulnerability detecting device and method which detect vulnerability of a plurality of high-performance web servers in real-time using a plurality of search engines simultaneously and automatically provide the updated detailed information on detected vulnerability. The device includes: a web server examination module for requesting a plurality of different search engines to examine a file with a likelihood of vulnerability, in response to an input search word, and receiving from the search engines URLs of web servers on which the file with a likelihood of vulnerability is located; an optimal information collection module for optimizing the URLs of the web servers received from the search engines to obtain optimal information; a web server vulnerability detecting module for detecting vulnerability of a web server corresponding to the optimal information; and a vulnerability information collection module for collecting and providing the latest detailed information on the detected vulnerability. | 2009-02-26 |
20090055932 | INFORMATION DISTRIBUTING APPARATUS AND METHOD, RECEIVING APPARATUS AND METHOD, DISTRIBUTION SYSTEM, AND COMPUTER PROGRAM - A distribution system is provided with: a distributing apparatus being provided with: a first compressing device ( | 2009-02-26 |
20090055933 | System, Method and Machine-Readable Medium for Periodic Software Licensing - A system and method for periodically licensing a software having a server configured to receive a first request code for a term extension of a software license, the request code being initiated by a user of an application unit, the term extension allows the software to operate within a predetermined period of time, provide advertising information to the application unit, and provide the term extension for the software license. | 2009-02-26 |
20090055934 | METHOD AND APPARATUS FOR SIMULTANEOUS VIEWING OF TWO ISOLATED DATA SOURCES - A method and apparatus for simultaneously displaying data from different sources. A data processing system includes a display unit, data processing units, and data diodes. The display unit has controls that are capable of generating control signals and the display unit is capable of simultaneously displaying the data from the different sources. The data processing units are arranged in a hierarchy of rankings. Each data processing unit is capable of accessing one of the sources. The data diodes are in the connections carrying control signals from the controls to data processing units and are in connections from one data processing unit to another data processing unit. Data is capable of moving only from a lower ranked data processing unit to a higher ranked data processing unit. Data is prevented from moving from a higher ranked data processing unit from a lower ranked data processing unit. | 2009-02-26 |
20090055935 | Data delivery system, issuance apparatus, terminal apparatus, and intermediate node - A license delivery system | 2009-02-26 |
20090055936 | METHOD AND SYSTEM FOR THE USER-SPECIFIC INITIALIZATION OF IDENTIFICATION DEVICES IN THE FIELD - The invention relates to a method and system for the user-specific initialization of identification devices in the field, particularly on-board units in road toll systems, based on a central facility, whereby each identification device, when delivered, has a unique device identification to which, in the central facility, a unique user identification is assigned, and in the central facility, an initialization PIN is generated from the device identification and from the user identification and is transmitted to the identification device from which the identification device, based on its device identification, computes the user identification for the user-specific initialization. | 2009-02-26 |
20090055937 | System, Method and Machine-Readable Medium for Periodic Software Licensing - A system and method for periodically licensing a software having a server configured to receive a first request code for a term extension of a software license, the request code being initiated by a user of an application unit, the term extension allows the software to operate within a predetermined period of time, provide advertising information to the application unit, and provide the term extension for the software license. | 2009-02-26 |
20090055938 | SYSTEM, METHOD AND MACHINE-READABLE MEDIUM FOR PERIODIC SOFTWARE LICENSING - A system and method for periodically licensing a software having a server configured to receive a first request code for a term extension of a software license, the request code being initiated by a user of an application unit, the term extension allows the software to operate within a predetermined period of time, provide adverting information to the application unit, and provide the term extension for the software license. | 2009-02-26 |
20090055939 | Probe for detection and quantification of nitric oxide, and method for detecting and quantifying nitric oxide using the same | 2009-02-26 |
20090055940 | ZEBRAFISH MODEL OF MLL LEUKEMOGENESIS - The zebrafish mll gene and methods of use thereof are provided. | 2009-02-26 |
20090055941 | Novel Neural Cell Specific Promoter And Baculovirus And Method For Gene Delivery - There is provided a novel hybrid promoter region that utilizes a neural specific promoter and an enhancer element, in one embodiment from a viral promoter, located upstream or downstream of the neural-specific promoter. The novel promoter can be used to create a viral vector, including a baculovirus vector, useful for gene delivery to neural cells. | 2009-02-26 |
20090055942 | Human Coagulation Factor VII Polypeptides - The present invention relates to novel human coagulation Factor Vila variants having substitutions of one or more amino acids at a position selected from the group consisting of position 172, 173, 175, 176, 177, 196, 197, 198, 199, 200, 203, 235, 237, 238, 239, 240, 286, 287, 288, 289, 290, 291, 292, 293, 294, 295, 297, 299, 319, 320, 321, 327, 341, 363, 364, 365, 366, 367, 370, 373 corresponding to amino acid positions of SEQ ID NO:1 and wherein said Factor VII polypeptide exhibits increased resistance to inactivation by an endogenous inhibitor of said FVII polypeptide relative to wild-type human FVIIa. | 2009-02-26 |
20090055943 | Methods of modifying eukaryotic cells - A method for engineering and utilizing large DNA vectors to target, via homologous recombination, and modify, in any desirable fashion, endogenous genes and chromosomal loci in eukaryotic cells. These large DNA targeting vectors for eukaryotic cells, termed LTVECs, are derived from fragments of cloned genomic DNA larger than those typically used by other approaches intended to perform homologous targeting in eukaryotic cells. Also provided is a rapid and convenient method of detecting eukaryotic cells in which the LTVEC has correctly targeted and modified the desired endogenous gene(s) or chromosomal locus (loci) as well as the use of these cells to generate organisms bearing the genetic modification. | 2009-02-26 |
20090055944 | HUMAN MONOCLONAL ANTIBODIES TO BE PROGRAMMED DEATH LIGAND 1 (PD-L1) - The present disclosure provides isolated monoclonal antibodies, particularly human monoclonal antibodies that specifically bind to PD-L1 with high affinity. Nucleic acid molecules encoding the antibodies of this disclosure, expression vectors, host cells and methods for expressing the antibodies of this disclosure are also provided. Immunoconjugates, bispecific molecules and pharmaceutical compositions comprising the antibodies of the invention are also provided. The disclosure also provides methods for detecting PD-L1, as well as methods for treating various diseases, including cancer and infectious diseases, using anti-PD-L1 antibodies. | 2009-02-26 |
20090055945 | Method for Producing Nuclear-Transplanted Egg - It is intended to provide a method for improving a development rate in a somatic nuclear transplantation technique or an artificial insemination technique using a spermatid. The method is a method for producing a nuclear-transplanted egg comprising the steps of transplanting a nucleus of a donor cell into an egg, and treating the nuclear-transplanted egg with an anti-methylating agent. | 2009-02-26 |
20090055946 | Method for Transferring One or More Genetic Traits from a Plant of the Purple-Flowered Capsicum Species to a Plant of the White Flowered Capsicum Species - The present invention relates to a method for transferring one or more genetic traits from a plant of the 5 purple-flowered | 2009-02-26 |
20090055947 | COTTON VARIETY 03Y047 - The invention relates to the novel cotton variety designated 03Y047. Provided by the invention are the seeds, plants, plant parts and derivatives of the cotton variety 03Y047. Also provided by the invention are tissue cultures of the cotton variety 03Y047 and the plants regenerated therefrom. Still further provided by the invention are methods for producing cotton plants by crossing the cotton variety 03Y047 with itself or another cotton variety and plants produced by such methods. | 2009-02-26 |
20090055948 | COTTON VARIETY 03Y056 - The invention relates to the novel cotton variety designated 03Y056. Provided by the invention are the seeds, plants, plant parts and derivatives of the cotton variety 03Y056. Also provided by the invention are tissue cultures of the cotton variety 03Y056 and the plants regenerated therefrom. Still further provided by the invention are methods for producing cotton plants by crossing the cotton variety 03Y056 with itself or another cotton variety and plants produced by such methods. | 2009-02-26 |
20090055949 | COTTON VARIETY 03Y062 - The invention relates to the novel cotton variety designated 03Y062. Provided by the invention are the seeds, plants, plant parts and derivatives of the cotton variety 03Y062. Also provided by the invention are tissue cultures of the cotton variety 03Y062 and the plants regenerated therefrom. Still further provided by the invention are methods for producing cotton plants by crossing the cotton variety 03Y062 with itself or another cotton variety and plants produced by such methods. | 2009-02-26 |
20090055950 | COTTON VARIETY 04T048 - The invention relates to the novel cotton variety designated 04T048. Provided by the invention are the seeds, plants, plant parts and derivatives of the cotton variety 04T048. Also provided by the invention are tissue cultures of the cotton variety 04T048 and the plants regenerated therefrom. Still further provided by the invention are methods for producing cotton plants by crossing the cotton variety 04T048 with itself or another cotton variety and plants produced by such methods. | 2009-02-26 |
20090055951 | COTTON VARIETY 04W019 - The invention relates to the novel cotton variety designated 04W019. Provided by the invention are the seeds, plants, plant parts and derivatives of the cotton variety 04W019. Also provided by the invention are tissue cultures of the cotton variety 04W019 and the plants regenerated therefrom. Still further provided by the invention are methods for producing cotton plants by crossing the cotton variety 04W019 with itself or another cotton variety and plants produced by such methods. | 2009-02-26 |
20090055952 | COTTON VARIETY 05X460 - The invention relates to the novel cotton variety designated 05X460. Provided by the invention are the seeds, plants, plant parts and derivatives of the cotton variety 05X460. Also provided by the invention are tissue cultures of the cotton variety 05X460 and the plants regenerated therefrom. Still further provided by the invention are methods for producing cotton plants by crossing the cotton variety 05X460 with itself or another cotton variety and plants produced by such methods. | 2009-02-26 |
20090055953 | COTTON VARIETY 05Y063 - The invention relates to the novel cotton variety designated 05Y063. Provided by the invention are the seeds, plants, plant parts and derivatives of the cotton variety 05Y063. Also provided by the invention are tissue cultures of the cotton variety 05Y063 and the plants regenerated therefrom. Still further provided by the invention are methods for producing cotton plants by crossing the cotton variety 05Y063 with itself or another cotton variety and plants produced by such methods. | 2009-02-26 |
20090055954 | COTTON VARIETY 05Z629 - The invention relates to the novel cotton variety designated 05Z629. Provided by the invention are the seeds, plants, plant parts and derivatives of the cotton variety 05Z629. Also provided by the invention are tissue cultures of the cotton variety 05Z629 and the plants regenerated therefrom. Still further provided by the invention are methods for producing cotton plants by crossing the cotton variety 05Z629 with itself or another cotton variety and plants produced by such methods. | 2009-02-26 |
20090055955 | SOYBEAN VARIETY D4698573 - The invention relates to the soybean variety designated D4698573. Provided by the invention are the seeds, plants and derivatives of the soybean variety D4698573. Also provided by the invention are tissue cultures of the soybean variety D4698573 and the plants regenerated therefrom. Still further provided by the invention are methods for producing soybean plants by crossing the soybean variety D4698573 with itself or another soybean variety and plants produced by such methods. | 2009-02-26 |
20090055956 | SOYBEAN VARIETY D4125897 - The invention relates to the soybean variety designated D4125897. Provided by the invention are the seeds, plants and derivatives of the soybean variety D4125897. Also provided by the invention are tissue cultures of the soybean variety D4125897 and the plants regenerated therefrom. Still further provided by the invention are methods for producing soybean plants by crossing the soybean variety D4125897 with itself or another soybean variety and plants produced by such methods. | 2009-02-26 |
20090055957 | SOYBEAN VARIETY D4325666 - The invention relates to the soybean variety designated D4325666. Provided by the invention are the seeds, plants and derivatives of the soybean variety D4325666. Also provided by the invention are tissue cultures of the soybean variety D4325666 and the plants regenerated therefrom. Still further provided by the invention are methods for producing soybean plants by crossing the soybean variety D4325666 with itself or another soybean variety and plants produced by such methods. | 2009-02-26 |
20090055958 | Soybean Cultivar S050228 - A soybean cultivar designated S050228 is disclosed. The invention relates to the seeds of soybean cultivar S050228, to the plants of soybean S050228, to plant parts of soybean cultivar S050228 and to methods for producing a soybean plant produced by crossing soybean cultivar S050228 with itself or with another soybean variety. The invention also relates to methods for producing a soybean plant containing in its genetic material one or more transgenes and to the transgenic soybean plants and plant parts produced by those methods. This invention also relates to soybean cultivars or breeding cultivars and plant parts derived from soybean variety S050228, to methods for producing other soybean cultivars, lines or plant parts derived from soybean cultivar S050228 and to the soybean plants, varieties, and their parts derived from use of those methods. The invention further relates to hybrid soybean seeds, plants and plant parts produced by crossing the cultivar S050228 with another soybean cultivar. | 2009-02-26 |
20090055959 | Soybean Cultivar S060292 - A soybean cultivar designated S060292 is disclosed. The invention relates to the seeds of soybean cultivar S060292, to the plants of soybean S060292, to plant parts of soybean cultivar S060292 and to methods for producing a soybean plant produced by crossing soybean cultivar S060292 with itself or with another soybean variety. The invention also relates to methods for producing a soybean plant containing in its genetic material one or more transgenes and to the transgenic soybean plants and plant parts produced by those methods. This invention also relates to soybean cultivars or breeding cultivars and plant parts derived from soybean variety S060292, to methods for producing other soybean cultivars, lines or plant parts derived from soybean cultivar S060292 and to the soybean plants, varieties, and their parts derived from use of those methods. The invention further relates to hybrid soybean seeds, plants and plant parts produced by crossing the cultivar S060292 with another soybean cultivar. | 2009-02-26 |
20090055960 | Soybean Cultivar 6540220 - A soybean cultivar designated 6540220 is disclosed. The invention relates to the seeds of soybean cultivar 6540220, to the plants of soybean 6540220, to plant parts of soybean cultivar 6540220 and to methods for producing a soybean plant produced by crossing soybean cultivar 6540220 with itself or with another soybean variety. The invention also relates to methods for producing a soybean plant containing in its genetic material one or more transgenes and to the transgenic soybean plants and plant parts produced by those methods. This invention also relates to soybean cultivars or breeding cultivars and plant parts derived from soybean variety 6540220, to methods for producing other soybean cultivars, lines or plant parts derived from soybean cultivar 6540220 and to the soybean plants, varieties, and their parts derived from use of those methods. The invention further relates to hybrid soybean seeds, plants and plant parts produced by crossing the cultivar 6540220 with another soybean cultivar. | 2009-02-26 |
20090055961 | INBRED CORN LINE PH8BC - A novel inbred maize line designated PH8BC and seed, plants and plant parts thereof. Methods for producing a maize plant that comprise crossing inbred maize line PH8BC with another maize plant. Methods for producing a maize plant containing in its genetic material one or more traits introgressed into PH8BC through backcross conversion and/or transformation, and to the maize seed, plant and plant part produced thereby. Hybrid maize seed, plant or plant part produced by crossing the inbred line PH8BC or an introgressed trait conversion of PH8BC with another maize line. Inbred maize lines derived from inbred maize line PH8BC, methods for producing other inbred maize lines derived from inbred maize line PH8BC and the inbred maize lines and their parts derived by the use of those methods. | 2009-02-26 |
20090055962 | Use of the Naked-Tufted Mutant in Upland Cotton to Improve Fiber Quality, Increase Seed Oil Content, Increase Ginning Efficiency, and Reduce the Cost of Delinting - Described is a naked-tufted seed mutant line of | 2009-02-26 |
20090055963 | Systemic gene silencing in plants - A novel VIGS vector is described based on pGR106. The vector includes a nucleotide silencing sequence which is homologous or complementary to a target gene of a host cell. The vector can induce gene silencing in whole plants and microplants and is also effective in the tubers of | 2009-02-26 |
20090055964 | MPO1 GENE AND PROTEIN AND METHODS OF USE - The present invention provides genes, proteins, and cells comprising recombinant methylputrescine oxidase (MPO) from | 2009-02-26 |
20090055965 | INCREASING GRAIN YIELD THROUGH TARGETED REDUCTION IN ETHYLENE SIGNALING - The present invention is directed to plant genetic engineering. In particular, it is directed to producing green leaves and increasing productivity through inhibition of ethylene. The compositions and methods of the invention involve dominant negative ethylene receptors that interfere with ethylene signaling. | 2009-02-26 |
20090055966 | Maize Promoter Active in Silk and Pericarp Tissues - The present disclosure provides compositions and methods for regulating expression of heterologous nucleotide sequences in a plant. Compositions include a novel nucleotide sequence for a tissue-preferred maize promoter. A method for expressing a heterologous nucleotide sequence in a plant using the promoter sequence disclosed herein is provided. The method comprises stably incorporating into the genome of a plant cell a nucleotide sequence operably linked to the tissue-preferred promoter of the present invention and regenerating a stably transformed plant that expresses the nucleotide sequence. | 2009-02-26 |
20090055967 | POLYNUCLEOTIDES AND POLYPEPTIDES INVOLVED IN POST-TRANSCRIPTIONAL GENE SILENCING - This invention relates to isolated nucleic acid fragments encoding polypeptides involved in post-transcriptional gene silencing. The invention also relates to construction of a recombinant DNA construct encoding all or a portion of the polypeptide involved in post-transcriptional gene silencing, in sense or antisense orientation, wherein expression of the recombinant DNA construct results in production of altered levels in a transformed host cell of the polypeptide involved in post-transcriptional gene silencing. | 2009-02-26 |
20090055968 | Method for producing direct in vitro flowering and viable seed from cotyledon, radicle, and leaf explants, and plants produced therefrom - The present invention relates to a method of reprogramming plant development that allows flower buds and seeds to arise de novo, directly from a cotyledon or radicle explants or from shoots produced on a cotyledon or radicle. The present invention also provides for an improved culturing media that provide for in vitro flowering. | 2009-02-26 |
20090055969 | AXMI-028 AND AXMI-029, A FAMILY OF NOVEL DELTA-ENDOTOXIN GENES AND METHODS FOR THEIR USE - Compositions and methods for conferring pesticidal activity to bacteria, plants, plant cells, tissues and seeds are provided. Compositions comprising a coding sequence for a delta-endotoxin polypeptide are provided. The coding sequences can be used in DNA constructs or expression cassettes for transformation and expression in plants and bacteria. Compositions also comprise transformed bacteria, plants, plant cells, tissues, and seeds. In particular, isolated delta-endotoxin nucleic acid molecules are provided. Additionally, amino acid sequences corresponding to the polynucleotides are encompassed. In particular, the present invention provides for isolated nucleic acid molecules comprising nucleotide sequences encoding the amino acid sequence shown in SEQ ID NO:2, 4, 15, 17, or 19, or the nucleotide sequence set forth in SEQ ID NO:1, 3, 14, 16, or 18, as well as variants and fragments thereof. | 2009-02-26 |
20090055970 | Yield increase in plants overexpressing the hsrp genes - A transgenic crop plant transformed by a Hookless-Like Stress-Related Polypeptide (HSRP) coding nucleic acid, wherein expression of the nucleic acid sequence in the crop plant results in the plant's increased root growth, and/or increased yield, and/or increased tolerance to environmental stress as compared to a wild type variety of the plant. Also provided are agricultural products, including seeds, produced by the transgenic crop plants. Also provided are isolated novel HSRPs and isolated novel nucleic acid coding HSRPs, and vectors and transgenic plant containing the same. | 2009-02-26 |
20090055971 | Plant having enhanced root elongation and method for production thereof - An object of the present invention is mainly to provide, using a genetically engineering technique, a plant with enhanced root elongation; a plant immune to suppression in root elongation ability even under hyperosmotic stress; and a method for enhancing plant root elongation. The subject invention produces a transgenic plant in which a Ran protein derived from a wild watermelon ( | 2009-02-26 |
20090055972 | GLUTATHIONE-S-TRANSFERASE GENE FROM PROPOSIS JULIFLORA CONFERS ABIOTIC STRESS TOLERANCE IN PLANTS - The present disclosure relates to isolation and characterization of PjGST gene from | 2009-02-26 |
20090055973 | Novel Omega-3 Fatty Acid Desaturase Family Members and Uses Thereof - The present invention relates to the isolation of a second omega-3 fatty acid desaturase (FAD3) gene in flax ( | 2009-02-26 |
20090055974 | Nucleic acids and proteins associated with sucrose accumulation in coffee - Disclosed herein are nucleic acid molecules isolated from coffee ( | 2009-02-26 |
20090055975 | Plant virus transmission inhibitor and methods - Provided is a peptide, peptide multimer or fusion protein containing such peptide which binds to the gut of sap-sucking insects, e.g., aphids. When bound, this peptide inhibits the binding of targeted virus to the insect gut. When this peptide or tandem repeat peptide is expressed (or is expressed as part of a fusion protein) in the fluids of transgenic plants, it is taken up by the insect with the sap, binds to gut receptors and thereby inhibits transmission of the virus from plant to plant via the insect vector. Thus, the use of such transgenic plants blocks or reduces the transmission of the targeted virus and others which share the peptide binding site within the insect gut among plants susceptible to the virus and thereby reduces losses due to viral infection. | 2009-02-26 |
20090055976 | Methods for the production of plants resistant to HPPD herbicides - Methods for making transgenic plants that are resistant to HPPD herbicides are presented. Polynucleotides other than those from | 2009-02-26 |
20090055977 | SCANNING NANOTUBE PROBE DEVICE AND ASSOCIATED METHOD - A method and device are provided for determining, without contact, the physical and electrical properties of nanotube materials. The device includes a scanning probe configured to generate a signal of certain frequency onto the nanotube material and measure a reflected signal from the nanotube material, and a processor coupled to the scanning probe and configured to determine the physical and electrical properties of the nanotube material from the measured reflected signal. The method includes positioning a scanning probe relative to the nanotube material, generating a signal of certain frequency onto the nanotube material, and measuring a reflected signal from the nanotube material. | 2009-02-26 |
20090055978 | Apple tree named 'PLBAR B1' - ‘PLBAR B1’ is a new apple tree that originated as a limb sport mutation of ‘Cripps Pink.’ The new variety is notable for its exceptional color and early maturity as compared to ‘Cripps Pink.’ Fruit of the new variety is mature and ready for harvest 14 to 18 days earlier than fruit of ‘Cripps Pink.’ | 2009-02-26 |
20090055980 | Buddleja plant named 'Miss Ruby' - ‘Miss Ruby’ is a new and distinct variety of butterfly bush that has the following unique combination of desirable features that are outstanding in a new variety. 1. Moderate vigor resulting in compact growth habit. 2. Ease of asexual propagation using softwood or semi-hardwood cuttings. 3. Upright growth habit with flowers borne stiffly on upright shoots. 4. Low female fertility and reduced seed set, resulting in less opportunity for seedlings to originate in the landscape setting. 5. Bright pink flower color, unknown in any other butterfly bush variety. | 2009-02-26 |
20090055981 | Buddleja plant named 'Blue Chip' - ‘Blue Chip’ is a new and distinct variety of butterfly bush that has the following unique combination of desirable features that are outstanding in a new variety. 1. Moderate vigor resulting in compact growth habit. 2. Ease of asexual propagation using softwood or semi-hardwood cuttings. 3. Spreading growth habit with multi-branched stems. 4. Male sterility, and low female fertility and reduced seed set, resulting in less opportunity for seedlings to originate in the landscape setting. 5. Blue flower color. | 2009-02-26 |
20090055982 | GARDENIA PLANT NAMED 'MADGA I' - A new and distinct cultivar of common | 2009-02-26 |
20090055983 | Calathea plant named 'TWYCA0026' - ABSTRACT A new | 2009-02-26 |
20090055984 | Aglaonema plant named 'TWYAG0020" | 2009-02-26 |
20090055985 | Calathea plant named 'TWYCA0019 2' | 2009-02-26 |
20090055986 | Mushroom named 'Grifon 120' - A new and distinct variety of mushroom, named ‘Grifon 120’, is described, which mushroom is characterized by its cap with thick flesh and delicious-looking whitish undersurface, good qualitative character and appearance, good keeping quality and storage life and delicious tasting. The mushroom can be cultivated by gathering and repeated breeding of fungal strains having dominant traits and is exquisite in stability, reproducibility and uniformity when being produced. | 2009-02-26 |