Patents - stay tuned to the technology

Inventors list

Assignees list

Classification tree browser

Top 100 Inventors

Top 100 Assignees


13th week of 2010 patent applcation highlights part 59
Patent application numberTitlePublished
20100083336METHOD AND APPARATUS FOR PROVIDING RICH MEDIA SERVICE - A method and apparatus for providing rich media service that is capable of serving rich media contents in adaptation to terminal capability and condition using the information on the complexity of the content and the operation level and memory space required to render the content is provided. The rich media service provision method includes defining scene component elements composing a rich media content and attributes of the scene component elements; calculating operation amount required to render the rich media content; generating the rich media content composed of the scene component elements and attributes, the operation amount being contained one of the scene component elements and attributes; and encoding and transmitting the rich media content.2010-04-01
20100083337Multipurpose television module - A method of processing a boot sequence for a processor forming a part of a module apparatus involves interrogating a host television device to determine if the host television device requires use of an application execution engine residing on the module apparatus; receiving a reply to the interrogation; and responsive to the reply, establishing a mode of operation wherein the application execution engine is used to execute application code for the host television device. This abstract is not to be considered limiting, since other embodiments may deviate from the features described in this abstract.2010-04-01
20100083338REMOTE CONTROL DEVICE AND REMOTE CONTROL SYSTEM - This invention provides a remote control system, comprising a local display device, a remote display device, a local set top box component coupling to the local display device for receiving and processing broadband media signals embodying a multimedia presentation from a content provider to the display device, a remote set top box component coupling to the remote display device for receiving and processing broadband media signals embodying a multimedia presentation from the content provider to the remote display device, a local mobile phone device coupling to the local set top box component via a wireless connection, and a remote mobile phone device coupling to the remote set top box component via a wireless connection, wherein a local user utilizes the local mobile phone device to communicate with a remote user who utilizes the remote mobile phone device and to capture a current motion image or still image such that the captured current motion image or still image is processed for transmission to and display on the local display device via the local STB component and for transmission to and display on said remote display device via the remote STB component.2010-04-01
20100083339DIGITAL BROADCASTING SYSTEM AND APPARATUS - A “program information constituent element table” is in common use at data transmitting locations, data relaying locations and data converting locations and plural programs are combined through high multiplexing to one MPEG-2 transport stream, thereby suppressing use of resources for network transmission among broadcasting bases.2010-04-01
20100083340Line Tapping Method of Video Amplification for Unshielded Twisted Pair Active Receiver - Embodiments of the present invention include systems, methods and apparatus for amplifying a composite video signal transmitted over long distance unshielded twisted pair cabling. The apparatus and system may include a plurality of amplifiers, an analog switch, and a control unit. The control unit generates a configuration signal to enable the output of one or more amplifiers (which may be serially connected) and configure the analog switch. A user input may be provided for manually configuring the amplifiers and analog switch. When the video signal is a color signal, the control unit may automatically configure the amplifiers and analog switch with reference to the amplitude of the color burst.2010-04-01
20100083341Multiple Signal Output System and Technology (MSOST) - The invention consists of a device, in the form of software or hardware, which converts a single audiovisual signal, with multiple components, to multiple signals transferred to different input devices. This Multiple Signal Output System and Technology is responsible of filtering a signal by virtual channels and separating images from the original source. The separation of the images can be outputted to different input devices using a variety of cables or similar technology. A videogame system can use the technology to separate multiplayer signals from one device to multiple screens or input devices. This invention solves the split-screen problem by giving the players the option to use one output device to play in multiple input devices. The Multiple Signal Output System and Technology separates in-software (in-movies, in-games) signals to output them to different devices. The technology can also capture different angles from an image (for example a movie) and output the separate signals to different input devices. With this technology, movies with multiple views and angles can be outputted to different devices simultaneously. Users can also watch movies, television, use the internet and play offline and online games simultaneously from the same output device and all the data is displayed simultaneously to different display screens or input devices. All these data can also be recorded by all the users simultaneously to the device using any storage solution. The invention uses standard cables, special cables and audiovisual wireless technology to output data to different display screens simultaneously.2010-04-01
20100083342AUDIO/VIDEO TRANSMISSION DEVICE - An AV transmission device includes a network cable and two transmission terminals. The network cable has eight transmission lines, which are grouped into four transmission line pairs. The two transmission terminals are respectively connected to one of two ends of the network cable. With the AV transmission device, power supply and a video signal can be coupled with each other and then transmitted via one of the four transmission line pairs. A control signal and left and right channel signals are respectively transmitted via one of the rest three transmission line pairs. Thus, when expanding an AV transmission range, it is not necessary to provide additional power supply at a remote location, signal transmission cost can be reduced, and a remote AV system can be conveniently operated locally.2010-04-01
20100083343System For Generating a Plurality of Display Signals - A system generates a plurality of display signals. The system includes a source of data representing a plurality of display images. A processor combines the data representing the plurality of display images into a single composite data matrix in which the data representing the plurality of display images are interleaved. A DVI signal generator produces a DVI signal representing the single composite data matrix. A splitter is responsive to the DVI signal representing the single composite data matrix. The splitter extracts the respective data representing the plurality of display images and generates corresponding DVI signals respectively representing the plurality of display images.2010-04-01
20100083344TRANSCODING OF AUDIO METADATA - The invention relates to the field of audio encoding. In particular, it relates to the transcoding of audio metadata between different audio coding schemes. It describes a method and a system for transcoding audio gain metadata related to dynamic range control from first gain metadata of a first audio coding scheme to second gain metadata of a second audio coding scheme, wherein the first and second audio coding schemes use coding blocks and wherein each coding block has at least one associated gain value. The method and the system select a gain value of the second gain metadata based on the gain values of the first gain metadata such that within a time interval around the time instance associated with the gain value of the second gain metadata, the minimum gain value of the first gain metadata is selected.2010-04-01
20100083345METHODS AND APPARATUS RELATED TO PACKET CLASSIFICATION ASSOCIATED WITH A MULTI-STAGE SWITCH - In one embodiment, an apparatus can include a policy vector module configured to retrieve a compressed policy vector based on a portion of a data packet received at a multi-stage switch. The apparatus can also include a decompression module configured to receive the compressed policy vector and configured to define a decompressed policy vector based on the compressed policy vector. The decompressed policy vector can define a combination of bit values associated with a policy.2010-04-01
20100083346Information Scanning Across Multiple Devices - Provided are, among other things, systems, methods and techniques for scanning information across multiple different devices. In one representative system, remote data-processing devices are provided with scanning applications that repeatedly scan information on their respective data-processing devices to identify matching data units that satisfy a specified matching criterion, the specified matching criterion including required matches against a set of screening digests, and then transmit characteristic information regarding the matching data units; and a central processing facility receives the characteristic information from the remote data-processing devices and determines whether the corresponding matching data units satisfy a policy criterion.2010-04-01
20100083347VERIFYING AND ENFORCING CERTIFICATE USE - A method, system, and computer usable program product for verifying and enforcing certificate use are provided in the illustrative embodiments. A certificate is received from a sender. The certificate is validated before communicating a message associated with the certificate to a receiver. If the certificate is invalid, a policy is selected based on a type of invalidity of the certificate. An action is taken to enforce the policy for using the certificate. The certificate may be received from the sender at a proxy. The validating may further include verifying the validity of the certificate using a certificate from a certificate database accessible to the proxy over a network. the proxy may copy a part of the certificate database to a second certificate database local to the proxy. The validating may further include verifying the validity of the certificate using a certificate revocation list accessible to the proxy over a network.2010-04-01
20100083348Method and rule-repository for generating security-definitions for heterogeneous systems - The present invention concerns a method for generating one or more system-specific security-definitions (2010-04-01
20100083349METHOD FOR REALIZING TRUSTED NETWORK MANAGEMENT - A method for realizing trusted network management is provided. A trusted management agent resides on a managed host, and a trusted management system resides on a management host. The trusted management agent and the trusted management system are software modules, which are both based on a trusted computing platform and signed after being authenticated by a trusted third party of the trusted management agent and the trusted management system. Trusted platform modules of the managed host and the management host can perform integrity measurement, storage, and report for the trusted management agent and the trusted management system. Therefore, the managed host and the management host can ensure that the trusted management agent and the trusted management system are trustworthy. Then, the trusted management agent and the trusted management system execute a network management function, thus realizing the trusted network management. Therefore, the technical problem in the prior art that the network management security cannot be ensured due to the mutual attack between an agent, a host where the agent resides, and a manager system is solved, and trusted network management is realized.2010-04-01
20100083350METHOD AND SYSTEM FOR ADVERTISING REAL ESTATE OVER THE INTERNET - An Internet-based method and system permits users to list their real estate properties on respective web site pages, edit their pages, and create new pages for additional listings. A feature of the invention provides for opening a domain name file for each new page and for E-mailing a request to register the new domain names. Such web site creation and editing may be made whenever the user wishes by simply accessing a home page, entering a corresponding service function such as editing an existing page or creating a new page. The user can then carry out the selected function from a personal computer over the Internet. The domain name may correspond to a parameter of the property such as its street address.2010-04-01
20100083351ACCESS CONTROL TO CONTENT PUBLISHED BY A HOST - Methods and systems for providing easy access to information and sharing are provided. Embodiments of the present invention enable a host to grant access to published content to one or more users in a manner in which the user(s) can scan small portions of information to decide which information is desired. The embodiments described herein enable, for example, a user to see a library of content that is larger than the storage capacity of the computing unit used by the user. The sharing of information is also secured through the use of auto-lock keys and the creation of abstract identities for the host and each user.2010-04-01
20100083352REMOTE ACCESS SYSTEM AND METHOD AND INTELLIGENT AGENT THEREFOR - The invention relates to remote access systems and methods using automatic speech recognition to access a computer system. The invention also relates to an intelligent agent resident on the computer system for facilitating remote access to, and receipt of, information on the computer system through speech recognition or text-to-speech read-back. The remote access systems and methods can be used by a user of the computer system while traveling. The user can dial into a server system which is configured to interact with the user by automatic speech recognition and text-to-speech conversion. The server system establishes a connection to an intelligent agent running on the user's remotely located computer system by packet communication over a public network. The intelligent agent sources information on the user's computer system or a network accessible to the computer system, processes the information and transmits it to the server system over the public network. The server system converts the information into speech signals and transmits the speech signals to a telephone operated by the user.2010-04-01
20100083353PERSONALIZED USER AUTHENTICATION PROCESS - A system and method for authenticating a user seeking access to a resource via a computer is described herein. In accordance with one embodiment, a person authorized to control access to the resource selects a personalized combination of non-text elements, a collection of non-text elements from which the combination must be selected, and an arrangement in which the collection of non-text elements is presented to the user. When the user attempts to access the resource, the system presents the collection of non-text elements to the user and requires the user to select a combination of non-text elements from among the collection of non-text elements that matches the personalized combination previously selected by the person authorized to control access to the resource.2010-04-01
20100083354THIRD PARTY VALIDATION OF INTERNET PROTOCOL ADDRESSES - A device can connect to a network over a first interface to configure and obtain an IP address. To communicate with nodes in a second network, over a second interface, the IP address can be validated by a trusted third party. The validation can include conducting a return routability test to validate a Prefix of the IP address. Cryptographically Generated Address verification can be utilized to verify the validity of an Interface Identifier included in the IP address. If the IP address is validated, the trusted third party can include the address in a verification ticket, which can also include a signature of the trusted third party. The device can provide the verification ticket to nodes in the second network as authentication of the device.2010-04-01
20100083355DISCOVERY PROFILE BASED UNIFIED CREDENTIAL PROCESSING FOR DISPARATE SECURITY DOMAINS - A method for discovery profile based unified credential processing for disparate security domains can include loading a discovery profile specifying types of manageable resources to be discovered during discovery of manageable resources and authentication protocols for use in accessing each type of the resources. The method also can include discovering the resources across disparate security domains and selecting a discovered one of the resources in a particular one of the security domains for a systems management task. The method further can include transforming an authentication credential not specific to the particular one of the security domains to a mapped authentication credential specific to the particular one of the security domains and authenticating into the particular one of the security domains with the mapped authentication credential utilizing an authentication protocol specified by the profile in order to perform the systems management task on the selected discovered one of the resources.2010-04-01
20100083356SYSTEM AND METHOD FOR INTELLIGENT AUTOMATED REMOTE MANAGEMENT OF ELECTROMECHANICAL DEVICES - Monitoring and control of electromechanical devices from a central data center. The data center may be located at a separate geographic location, using broadband communication channels, such as Internet or telecom channels, and wireless HAN (home area network) communications. Such electromechanical devices may comprise, for example, an HVAC system at a small-business or residential site, a grounds-maintenance sprinkler system, or a small wind or solar energy generation and storage station.2010-04-01
20100083357REMOTE REGISTRATION OF BIOMETRIC DATA INTO A COMPUTER - Systems and arrangements for permitting the transmission of fingerprint authentication data to a system remotely, while also permitting the system to employ such data as well as passwords in order to operate a computer system, while ensuring a reliable level of security for any group or organization using such systems and arrangements.2010-04-01
20100083358Secure Data Aggregation While Maintaining Privacy - Disclosed herein is a computer implemented method and system that securely aggregates and manages user related data in an online environment while maintaining privacy of a user. The user provides access credentials at a client device for each of multiple data sources. The access credentials are transformed to an unreadable format at the client device using a public key transmitted by a web server. The transformed access credentials in the unreadable format are stored locally on the client device. A communicating software agent on the client device communicates the stored access credentials to the web server. The web server transforms the communicated access credentials to a readable format using a private key and retrieves the user related data by accessing the data sources using the access credentials in the readable format. The web server presents the retrieved user related data to the user in one or more presentation modes.2010-04-01
20100083359TRUSTED DATABASE AUTHENTICATION THROUGH AN UNTRUSTED INTERMEDIARY - A method, system and computer-usable medium are disclosed for validating user credentials submitted to a data source by an untrusted intermediary. An untrusted intermediary attempts to access a data source on behalf of a user. The untrusted intermediary challenges the user to provide credentials of the type and format required to access the data provided by the data source. The user's trust client connects to an authentication service and identification credentials of the required type and format are generated. The identification credentials are conveyed to the user's trust client, which then provides them to the user's client, which in turn conveys them to the untrusted intermediary. The untrusted intermediary then presents the identification credentials to an authentication plug-in of the data source. The authentication plug-in validates the authenticity of the provided credentials with their associated authentication service. Once the credentials are successfully validated, the requested data is provided to the user's client by the untrusted intermediary.2010-04-01
20100083360PORTABLE AUTHENTICATION DEVICE - In one aspect, a disclosed portable authentication device (PAD) includes a processor, storage media, an interface for enabling communication with an external information handling system (IHS), e.g., a computer or a telephony device, and executable instructions embedded in the storage media, for automated authentication. The embedded instructions include instructions for enabling a user to store authentication information, e.g., use ID and password information, corresponding to an IHS destination, e.g., a telephone number of an interactive voice response system or an IP address of a web server. If the PAD recognizes the current destination, the PAD may respond to an assertion of a keypad control element by making authorization information corresponding to the current destination available to the user or providing the authorization information directly to the current destination. The PAD may include one or more telephony interface(s), e.g., RJ-11 jack(s) and one or more computer interfaces, e.g., USB connector(s).2010-04-01
20100083361Managing Web Single Sign-On Applications - A method of managing a web single sign-on (SSO) application with a common set of uniform resource locators (URLs) includes defining a first servlet mapping including a description of a protected URL resource pattern, defining a second servlet mapping including a description of an unprotected URL resource pattern, determining display logic support to establish if display logic of the web SSO application supports both the first servlet mapping and the second servlet mapping, configuring the display logic of the web SSO application based on the determination, defining an intercepting filter, and registering URL patterns for the common set of URLs in the intercepting filter, the URL patterns including definitions of the protected URL resource pattern and the unprotected URL resource pattern.2010-04-01
20100083362METHOD AND SYSTEM OF MANAGING AND ALLOCATING COMMUNICATION RELATED RESOURCES - A system and method for managing communication. The system and method applying to but not limited to settop boxes (STBs) and other devices used to interface services. The management including any number of features and processes associated with achieving Quality of Service (QoS) across different domains and according to network limitations associated with the same.2010-04-01
20100083363BINDING ACTIVATION OF NETWORK-ENABLED DEVICES TO WEB-BASED SERVICES - A method for associating a networked device with an online service is provided. The networked device may be an appliance or other device that has limited input capabilities, making it difficult to to download information such as digital media files from an online service without having to input a significant amount of information using the device or appliance. The method begins by establishing communication with a service over a network. A claim token is received from the service over the network. The claim token is returned to the service over the network after the claim token has been bound to an authorized user of the service. In response to return of the claim token, a device identifier binds the networked device to an account with the service that is associated with the authorized user.2010-04-01
20100083364Method for Lawfully Intercepting Communication IP Packets Exchanged Between Terminals - A method for lawfully intercepting communication IP packets exchanged between terminals is provided. The method involves assigning an IP address associated with a telecommunication service provider to, for example, a sending terminal for use as its IP address in communications with a receiving terminal, the telecommunication service provider providing SIP proxy services for establishing communication between the sending and receiving terminals. The communication IP packets are intercepted in such a way that the terminals are unaware of the interception.2010-04-01
20100083365Apparatus and method to harden computer system - In some embodiments, a processor-based system may include a processor, the processor having a processor identification, one or more electronic components coupled to the processor, at least one of the electronic components having a component identification, and a hardware security component coupled to the processor and the electronic component. The hardware security component may include a secure non-volatile memory and a controller. The controller may be configured to receive the processor identification from the processor, receive the at least one component identification from the one or more electronic components, and determine if a boot of the processor-based system is a provisioning boot of the processor-based system. If the boot is determined to be the provisioning boot, the controller may be configured to store a security code in the secure non-volatile memory, wherein the security code is based on the processor identification and the at least one component identification. Other embodiments are disclosed and claimed.2010-04-01
20100083366Blocking Computer System Ports on Per User Basis - An approach is provided that receives a user identifier from a user of the information handling system. The user identifier can include a username as well as a user authentication code, such as a password. Hardware settings that correspond to the user identifier are retrieved from a nonvolatile memory. Hardware devices, such as ports (e.g., USB controller), network interfaces, storage devices, and boot sequences, are configured using the retrieved hardware settings. After the hardware devices have been configured to correspond to the identified user, an operating system is booted.2010-04-01
20100083367Secure Partitioning of Programmable Devices - According to an embodiment, a programmable logic device includes a plurality of logic blocks, memory and a logic unit. The logic blocks are grouped into one or more partitions. The memory stores authentication and partition information uploaded to the programmable logic device prior to partition programming. The logic unit authenticates programming access to the one or more partitions based on the authentication information and controls programming of the one or more partitions based on the partition information.2010-04-01
20100083368THUMB DRIVE GUEST USER - A method and system for managing a computer user, comprising initiating a user session for the computer user based on user data stored in one partition on a removable computer readable medium. The user data is associated with a user ID, and the user ID is stored on a second partition of the removable computer readable medium. The user ID is used to identify the user data to the computer user. The computer user is authenticated as being associated with the user data based in part on the user ID. Also described is an article of manufacture for creating a partition on a removable computer readable medium for storing user data and associating it with a second partition storing an associated user ID on the removable computer readable medium.2010-04-01
20100083369METHOD AND APPARATUS PROVIDING A FRAMEWORK FOR SECURE INFORMATION LIFECYCLE - A method, apparatus and computer program product for handling secure information (e.g., a password, an account number, a personal identification number (PIN), a user identifier, an encryption key, and a path where said secure information is stored) is presented. Secure information is stored in a software container. A plurality of representations of the secure information is provided, each of the plurality of representations for use under different conditions. Dependent on the particular condition, at least one of the plurality of representations of the secure information is provided by the container. The container holds the secure information during all stages of processing in a manner that prevents unauthorized parties from gaining access to the secret in clear form.2010-04-01
20100083370SYSTEM AND METHOD FOR DYNAMIC CYPHER AUTHENTICATION - A dynamic cypher authentication system is applied to an electronic device having an authentication password. The system includes an input module, a password triggering module, an operation module, and an authentication module. The input module receives an operator password input by a user. The password triggering module generates a trigger signal and then generates a prompt password according to the trigger signal. The operation module performs a mathematical operation on the prompt password according to the operator password, so as to generate the authentication password. The authentication module receives a login password and compares the login password with the authentication password, so as to determine whether to authorize a login request on the electronic device.2010-04-01
20100083371User Access Control System And Method - A user access control system, comprising an electronic device comprising an electronic device comprising a reduced function operating system configured to enable access to at least one type of media content and a content control module executable by the reduced function operating system, the content control module configured to authenticate an identity of a user and control access to the at least one type of media content based on the identity of the user.2010-04-01
20100083372IMAGE FORMING APPARATUS AND SECURITY SETTING METHOD THEREOF - An image forming apparatus and a security setting method thereof. The security setting method of the image forming apparatus includes supplying power initially to the image forming apparatus, displaying an administrator setting screen for the image forming apparatus, and changing a preset administrator password of the image forming apparatus from the displayed administrator setting screen.2010-04-01
20100083373METHODS AND APPARATUS FOR DETERMINING USER AUTHORIZATION FROM MOTION OF A GESTURE-BASED CONTROL UNIT - Methods and apparatus for determining user authorization from motion of a gesture-based control unit are disclosed. An example method to determine user authorization from motion of a gesture-based control unit disclosed herein comprises detecting motion of the gesture-based control unit, the motion caused by a user, determining a detected gesture from a sequence of one or more detected motions of the gesture-based control unit, and identifying the user from the detected gesture to determine an authorization for use by the gesture-based control unit.2010-04-01
20100083374TECHNIQUES TO MANAGE ACCESS TO ORGANIZATIONAL INFORMATION OF AN ENTITY - Techniques to manage access to organization information for an entity are described. An apparatus may include a presentation component operative to present an organizational chart on a presentation surface. The organizational chart may comprise multiple nodes associated with members of an organization, and connections between the nodes representing hierarchical relationships between the nodes. A security component may be communicatively coupled to the presentation component. The security component may be operative to receive a request to modify a characteristic of the organizational chart from an operator, access security settings for the operator, and authorize the operator to modify a characteristic of the organizational chart. Authorization may be granted, for example, when the operator is a delegate and a permission level for the delegate allows a modification operation associated with the modify request. Other embodiments are described and claimed.2010-04-01
20100083375DETECTION ACCURACY TUNING FOR SECURITY - Aspects of the subject matter described herein relate to tuning detection components of a security system. In aspects, a history of alerts is collected. This history is then used together with knowledge about tunable objects of the system to determine parameters of the tunable objects that can be changed to improve detection of the system. Parameters of tunable objects are adjusted in a simulator that determines an effect on alerts in the history based on the adjusted parameters. A recommendation of one or more tuning actions may be provided together with information regarding the effect of each tuning action.2010-04-01
20100083376METHOD AND APPARATUS FOR REDUCING FALSE POSITIVE DETECTION OF MALWARE - Method and apparatus for detecting malware are described. In some examples, files of unknown trustworthiness are identified as potential threats on the computer. A trustworthiness level for each of the files is received from a backend. The trustworthiness level of each of the files is compared to a threshold level. Each of the files where the trustworthiness level thereof satisfies the threshold level is designated as a false positive threat. Each of the files where the trustworthiness level thereof does not satisfy the threshold level is designated as a true positive threat.2010-04-01
20100083377METHOD AND APPARATUS TO DEFINE THE SCOPE OF A SEARCH FOR INFORMATION FROM A TABULAR DATA SOURCE - A method and apparatus for defining the scope of a search is described. In one embodiment, user input is received, and the scope is defined, based on the user input, for a search of free-form text for information from any random rows within a tabular structure of source data. In one embodiment, the search is intended for finding, in the free-form text, a sub-set of data fragments that matches information from any single row within the tabular structure of the source data.2010-04-01
20100083378Contextual Alert Of An Invasion Of A Computer System - Methods, systems, and computer-readable media for providing contextual feedback to a user of a computer system upon detection of an invasion of the computer system are provided herein. An invasion of the computer system is detected and a contextually appropriate alert is selected from a set of alerts. The alert is played immediately upon detection of the invasion so that the user is alerted to the invasion within close temporal proximity to the user's action that resulted in the invasion of the computer system. In addition, details of the invasion are logged to a diagnostic log file for later use by support personnel in repairing the computer system.2010-04-01
20100083379INFORMATION PROCESSING DEVICE, INFORMATION PROCESSING METHOD, AND COMPUTER READABLE RECORDING MEDIUM - An example of a device comprises a storage which stores data which is input from outside and to which tracking information is added, a section which detects a first reading event of first data from the storage to which the tracking information is added, a section which detects, after the first reading event, a first writing event to part of character string data to the storage, a section which detects, after the first writing event, a second reading event of second data from the storage to which the tracking information is added, a section which detects, after the second reading event, a second writing event to part of the character string data to the storage, and a section which adds, when the first reading/writing event, second reading/writing event are detected, the tracking information to data to be written to the storage by the first and second writing event.2010-04-01
20100083380NETWORK STREAM SCANNING FACILITY - In embodiments of the present invention improved capabilities are described for providing a scanning of data associated with a network computer facility. In the process, a request may be received for network content from a content requesting computing facility. A source lookup associated with the request for network content may be performed, where the source lookup may be from a networked source lookup database. The requested network content may then be retrieved, where the type of the content may be determined as a further aid in scanning the content. A checksum of at least a portion of the retrieved network content may then be calculated, and a checksum lookup associated with the portion of the retrieved network content be performed, where the checksum lookup may be from a networked checksum lookup database. Finally, an action may be taken based on at least one of the source lookup and checksum lookup, where the action is associated with protecting the content requesting computing facility from malware.2010-04-01
20100083381Hardware-based anti-virus scan service - A device, system, and method are disclosed. In an embodiment, the device includes a storage medium to store files. The device also includes a manageability engine. The manageability engine accesses a virus signature file. The manageability engine then performs an anti-virus scan using patterns in the signature file to compare to one or more of the files. The manageability engine then reports the results of the scan to an external agent.2010-04-01
20100083382Method and System for Managing Computer Security Information - A security management system includes a fusion engine which “fuses” or assembles information from multiple data sources and analyzes this information in order to detect relationships between raw events that may indicate malicious behavior and to provide an organized presentation of information to consoles without slowing down the processing performed by the data sources. The multiple data sources can comprise sensors or detectors that monitor network traffic or individual computers or both. The sensors can comprise devices that may be used in intrusion detection systems (IDS). The data sources can also comprise firewalls, audit systems, and other like security or IDS devices that monitor data traffic in real-time. The present invention can identify relationships between one or more real-time, raw computer events as they are received in real-time. The fusion engine can also assess and rank the risk of real-time raw events as well as mature correlation events.2010-04-01
20100083383PHISHING SHIELD - A mechanism for notifying a user of an internet browser that a requested web page is undesirable, and for protecting the user from the web page by disabling it. An internet browser detects a load request for a web page and retrieves the Uniform Resource Locator (URL) for the webpage. The internet browser displays the webpage associated with the URL and, upon determination that the URL matches a URL from a list of undesirable URLs, alters the appearance of the webpage and disables the web page from receiving input or taking action.2010-04-01
20100083384Secure Operation of Programmable Devices - According to an embodiment, a programmable logic device includes a plurality of logic blocks, memory, a plurality of connection control elements and a logic unit. The logic blocks are grouped into one or more programmed partitions. The memory stores authentication information and partition information. The connection control elements controllably interconnect different ones of the logic blocks. The logic unit controls external access to the one or more partitions based on the authentication information, controls reprogramming of the one or more partitions based on at least some of the partition information and configures the connection control elements based on at least some of the partition information.2010-04-01
20100083385RIGHT MANAGEMENT METHOD, ITS SYSTEM, SERVER DEVICE USED IN THE SYSTEM, AND INFORMATION DEVICE TERMINAL - There is provided an authority management system in which, when a data user discloses secret information only to a specific partner having the authority to receive the disclosure of the secret information, the information can be disclosed only if the correctness of the partner is confirmed in a face-to-face manner. A holder of disclosure data encrypts data, generates and divides a decryption key of the data, and sends a partial decryption key to a disclosure partner beforehand. At the time of data disclosure, the data holder physically meets a disclosure partner terminal. The partial decryption key is sent in a proximate state, and the decryption key is reproduced. With this, the data is decrypted and disclosed. Thus, the data holder meets the disclosure partner having the authority to receive the disclosure, and visually confirms the correctness of the partner.2010-04-01
20100083386Tokenized Resource Access - A method and system for unlocking diagnostic functions in a hardware device for a user. The method obtains a signed permission object for the hardware device, and validates the signed permission object. A memory of the hardware device stores a device identifier and a last recorded sequence number. The signed permission object includes a sequence number and is associated with an expiration counter having an initial value that indicates a lifetime for the signed permission object. When the signed permission object is valid, the method updates the expiration counter to decrease the lifetime of the signed permission object, stores the sequence number associated with the signed permission object as the last recorded sequence number in the hardware device, and unlocks the diagnostic functions for the user based on the signed permission object.2010-04-01
20100083387METHOD AND SYSTEM FOR A SECURE POWER MANAGEMENT SCHEME - A security processor integrated within a system may be securely shut down. The security processor may receive shut down requests, and may determine components and/or subsystems that need be shut down during shut down periods. The security processor may determine when each of the relevant components is ready for shut down. Once the relevant components are shut down, the security processor may itself be shut down, wherein the shut down of the security processor may be performed by stopping the clocking of the security processor. A security error monitor may monitor the system during shut down periods, and the security processor may be powered back on when security breaches and/or threats may be detected via the security error monitor. The security error monitor may be enabled to power on the security processor by reactivating the security processor clock, and the security processor may then power on the system.2010-04-01
20100083388NETWORK PROJECTOR AND PROJECTOR SYSTEM - The present invention aims to provide a network projector which has a simple security function via a network. The network projector comprises a power source unit which supplies power to the network projector and a display signal control unit which, when confirming that a connection confirmation signal which is transmitted at a fixed period from a host computer via a network is not inputted for more than a predetermined time, outputs a supply stop signal to the power source unit indicating that the supply of power should be stopped.2010-04-01
20100083389Production of heterologous protein in the avian oviduct - The invention includes methods of making transgenic avians by introducing a nucleic acid sequence into the genome of an avian embryo wherein the nucleic acid sequence comprises a nucleotide sequence encoding a heterologous protein, developing the avian embryo to hatch, developing the hatched chick to sexual maturity and obtaining offspring from the sexually mature hatched chick which produce egg white containing the heterologous protein.2010-04-01
20100083390FORMULATION FOR THE BIOLOGICAL CONTROL OF INSECT-PESTS - A formulation for the biological control of pests comprises a cohort of infective juvenile insect-parasitic nematodes from at least three species, wherein at least two of the species are of a first genus, and at least one of the species is from a second genus, and the species number from the first genus is greater than the species number from the second genus. The cohort of nematodes consists essentially of two species from the first genus and one species from the second genus and comprises at least one ambusher foraging species of nematode from a first genera and at least two cruiser foraging species of nematode from a different genera, or at least two ambusher foraging species of nematode from the same genera and at least one cruiser foraging species of nematode from a different genera. The first and second genus are selected from the group comprising: Steinernematidae and Heterorhapditidae.2010-04-01
20100083391Cancer Compositions, Animal Models, and Methods of Use Thereof - The construction of animal models of cancer and methods of using the models to screen potential cancer therapeutics are described.2010-04-01
20100083392HAFNIA PHYTASE VARIANTS - The present invention relates to phytases having at least 76% identity to a phytase derived from 2010-04-01
20100083393METHOD OF CONSTRUCTING CLONE MAMMAL - The present invention provides a method of producing a cloned mammal, which uses a mammalian natural killer T cell as a donor cell, a cloned mammal obtained by the method, a method of obtaining an ES cell from the embryo of the cloned animal and an ES cell obtained by the method.2010-04-01
20100083394Inbred Rice Line P64-2S - An inbred rice line designated P64-2S is disclosed. The invention relates to the seeds of inbred rice line P64-2S, to the plants of inbred rice line P64-2S and to methods for producing a rice plant produced by crossing the inbred rice line P64-2S with itself or another rice plant. The invention further relates to hybrid rice seeds and plants produced by crossing the inbred rice line P64-2S with another rice plant. This invention further relates to growing and producing blends of rice seeds comprised of seeds of inbred rice line P64-2S with rice seed of one, two, three, four or more of another rice hybrid, rice variety or rice inbred.2010-04-01
20100083395STRESS-RELATED POLYNUCLEOTIDES AND POLYPEPTIDES IN PLANTS - The invention relates to plant transcription factor polypeptides, polynucleotides that encode them, homologs from a variety of plant species, and methods of using the polynucleotides and polypeptides to produce transgenic plants having advantageous properties compared to a reference plant. Sequence information related to these polynucleotides and polypeptides can also be used in bioinformatic search methods and is also disclosed.2010-04-01
20100083396Soybean Gene for Resistance to Aphis glycines2010-04-01
20100083397Lettuce Cultivar 50-0501050-B - A lettuce cultivar, designated 50-0501050-B, is disclosed. The invention relates to the seeds of lettuce cultivar 50-0501050-B, to the plants of lettuce cultivar 50-0501050-B and to methods for producing a lettuce plant by crossing the cultivar 50-0501050-B with itself or another lettuce cultivar. The invention further relates to methods for producing a lettuce plant containing in its genetic material one or more transgenes and to the transgenic lettuce plants and plant parts produced by those methods. This invention also relates to lettuce cultivars or breeding cultivars and plant parts derived from lettuce cultivar 50-0501050-B, to methods for producing other lettuce cultivars, lines or plant parts derived from lettuce cultivar 50-0501050-B and to the lettuce plants, varieties, and their parts derived from the use of those methods. The invention further relates to hybrid lettuce seeds, plants, and plant parts produced by crossing cultivar 50-0501050-B with another lettuce cultivar.2010-04-01
20100083398Lettuce Cultivar 'Steamboat' - A lettuce cultivar, designated ‘Steamboat’, is disclosed. The invention relates to the seeds of lettuce cultivar ‘Steamboat’, to the plants of lettuce cultivar ‘Steamboat’ and to methods for producing a lettuce plant by crossing the cultivar ‘Steamboat’ with itself or another lettuce cultivar. The invention further relates to methods for producing a lettuce plant containing in its genetic material one or more transgenes and to the transgenic lettuce plants and plant parts produced by those methods. This invention also relates to lettuce cultivars or breeding cultivars and plant parts derived from lettuce cultivar ‘Steamboat’, to methods for producing other lettuce cultivars, lines or plant parts derived from lettuce cultivar ‘Steamboat’ and to the lettuce plants, varieties, and their parts derived from the use of those methods. The invention further relates to hybrid lettuce seeds, plants, and plant parts produced by crossing cultivar ‘Steamboat’ with another lettuce cultivar.2010-04-01
20100083399COMPOSITIONS AND METHODS FOR ASSAYING MARKERS TIGHTLY LINKED TO RESISTANCE LOCUS Bs2 OF PEPPER - The invention relates to compositions and methods for genotypically screening pepper lines for the presence of a polymorphism at the Bs2_5859 locus genetically linked to the Bs2 gene conferring resistance to Bacterial Spot caused by 2010-04-01
20100083400Lolium Multiflorum Line Inducing Genome Loss - Dihaploid homozygous Fescue species may be produced by interspecific hybridization of Fescue with novel ryegrass, 2010-04-01
20100083401PLANTS HAVING IMPROVED TOLERANCE TO VARIOUS TYPES OF ENVIRONMENTAL STRESS, THEIR PRODUCTION, AND POLYAMINE METABOLISM-RELATED ENZYME GENES - The invention provides a method for producing a transgenic plant, as well as the plant produced from the method and the progeny of the plant. The method comprises transforming a cell of a plant with an exogenous spermidine synthase coding sequence, expressing the exogenous spermidine synthase coding sequence in the transformed cell, and generating a plant from the transformed cell. The transgenic plant has improved environmental stress tolerance against at least two environmental stresses selected from drought stress, herbicidal stress, oxidation stress, cold stress, osmotic stress, and salt stress as compared to a plant of the same species lacking the exogenous spermidine synthase coding sequence.2010-04-01
20100083402Transcription Factor Sequences for Conferring Advantageous Properties to Plants - The invention relates to plant transcription factor polypeptides, polynucleotides that encode them, homologs from a variety of plant species, and methods of using the polynucleotides and polypeptides to produce transgenic plants having advantageous properties compared to a reference or control plant, including increased plant size, seed size, increased leaf size, lignification, water deprivation tolerance, cold tolerance, or altered flowering time. Sequence information related to these polynucleotides and polypeptides can also be used in bioinformatic search methods and is also disclosed.2010-04-01
20100083403PRODUCTION OF PEPTIDES AND PROTEINS BY ACCUMULATION IN PLANT ENDOPLASMIC RETICULUM-DERIVED PROTEIN BODIES - A nucleic acid molecule is disclosed as containing a first nucleic acid sequence comprising a nucleotide sequence that encodes γ-zein protein, or a fragment thereof capable of directing and retaining a protein towards the endoplasmic reticulum (ER) of a plant cell; a second nucleic acid sequence containing a nucleotide sequence that encodes an amino acid sequence that is specifically cleavable by enzymatic or chemical means; and a third nucleic acid sequence containing the nucleotide sequence that encodes a peptide or protein of interest. Methods of using this nucleic acid molecule for transforming host plant cells and producing the peptide or protein of interest are also disclosed.2010-04-01
20100083404Plant Having Increased Yield of Seeds - It is found that a transformed plant into which a γ-glutamylcysteine synthetase gene has been introduced is increased in at least one of the number of flowers and the number of seeds in comparison with a wild-type plant, and is therefore increased in seed yield. Based on this finding, the present invention elucidates the function of a product of a plant-derived γ-glutamylcysteine synthetase gene and provides a technique for producing a plant having an increased seed yield.2010-04-01
20100083405Method For Controlling Seed Germination In Non-Dormant Seeds And Use Thereof - The present invention is directed to a method of controlling seed germination in non-dormant seeds. The invention is notably directed to a method of delaying germination or temporarily inducing dormancy in non-dormant seeds. The invention further relates to transgenic plants and seeds presenting controlled or delayed germination, notably under environmental favorable conditions.2010-04-01
20100083406Black Garabedian - A new and distinct variety of plum tree that is characterized by producing a semi freestone fruit with good dark red coloration and is ripe for commercial harvesting and shipment June 3-June 14 in the San Joaquin Valley of Central Calif. The new variety is closely similar to ‘Santa Rosa’ plum (non patented) from which it is hybridized but it is distinguishable in that it ripens seven to ten days before ‘Santa Rosa’ variety. The fruit of this new variety is medium size with good flavor and good dark red color which makes it greatly acceptable for the consumer.2010-04-01
20100083407NUCLEOTIDE SEQUENCES AND POLYPEPTIDES ENCODED THEREBY USEFUL FOR MODIFYING PLANT CHARACTERISTICS - Isolated polynucleotides and polypeptides encoded thereby are described, together with the use of those products for making transgenic plants.2010-04-01
20100083408Gene Expression Modulating Element - The present invention provides a method of screening for the purpose of obtaining gene expression modulating elements and gene insulator elements. The invention includes a method of identifying gene expression modulating elements and gene insulator elements through use of the following steps: a) locating intergenic regions of a plant genome that are flanked by a gene on each side that have differing gene expressions b) taking that intergenic region or a portion of that intergenic region and adding it to a cassette comprising an isolated gene c) introducing the cassette into a plant cell d) analyzing expression of the isolated gene. The present invention also includes identified sequences that act as gene expression modulating elements.2010-04-01
20100083409Gene Expression Modulating Element - The present invention provides a method of screening for the purpose of obtaining gene expression modulating elements and gene insulator elements. The invention includes a method of identifying gene expression modulating elements and gene insulator elements through use of the following steps: a) locating intergenic regions of a plant genome that are flanked by a gene on each side that have differing gene expressions b) taking that intergenic region or a portion of that intergenic region and adding it to a cassette comprising an isolated gene c) introducing the cassette into a plant cell d) analyzing expression of the isolated gene. The present invention also includes identified sequences that act as gene expression modulating elements.2010-04-01
20100083410MICROSCOPE SYSTEM - A microscope system comprises a microscope including a motorized stage on which is mounted a container containing a specimen and which can adjust the position of the container, a scanner scanning laser light radiated onto the specimen, an objective lens focusing the scanned laser light, an image-acquisition unit acquiring a specimen image by detecting fluorescence produced in the specimen, and a dark box containing these components; a storage unit storing the mounting position of the container on the motorized stage; an image-acquisition-position setting unit setting acquisition positions of partial images of the inside of the container, on the basis of the stored mounting position of the container; a control section controlling the microscope so as to acquire the partial images for each container on the basis of the set acquisition positions; and a map-image generating section arranging the partial images to generate a map image.2010-04-01
20100083411'Black Garabedian' Plum Tree - A new and distinct variety of plum tree that is characterized by producing a semi freestone fruit with good dark red coloration and is ripe for commercial harvesting and shipment June 3-June 14 in the San Joaquin Valley of Central California. The new variety is closely similar to ‘Santa Rosa’ plum (non patented) from which it is hybridized but it is distinguishable in that it ripens seven to ten days before ‘Santa Rosa’ variety. The fruit of this new variety is medium size with good flavor and good dark red color which makes it greatly acceptable for the consumer.2010-04-01
20100083412Cosmos plant named 'CC3013/01' - A new cultivar of 2010-04-01
Website © 2025 Advameg, Inc.