Patents - stay tuned to the technology

Inventors list

Assignees list

Classification tree browser

Top 100 Inventors

Top 100 Assignees


14th week of 2010 patent applcation highlights part 54
Patent application numberTitlePublished
20100088723BROADCAST RECEIVER, AND CONTROL METHOD FOR BROADCAST RECEIVER - The broadcast receiver includes a storage unit configured to store first broadcast information for specifying a broadcast channel and/or program viewable on the broadcast receiver, an acquisition unit configured to acquire second broadcast information from the other broadcast receiver for specifying a broadcast channel and/or program viewable on the other broadcast receiver, an extraction unit configured to extract a broadcast channel and/or program from the first and second broadcast information not viewable on the broadcast receiver and viewable on the other broadcast receiver, and a generation unit configured to generate an electronic program guide that a user can distinguish a broadcast channel and/or program extracted from a broadcast channel and/or program that is viewable on the broadcast receiver.2010-04-08
20100088724Broadcast program display apparatus and method - Received by a program display apparatus are: programs for each of which a receiving time has been determined; digest views corresponding to the programs; and receiving-time information for the programs. The received digest views and receiving-time information are stored in a memory. A moving picture is displayed on a main screen zone of a monitor screen, with the digest views that have been stored in the memory on a sub screen zone of the monitor screen, as being superposed on the moving picture, according to the user's operation. Each digest view is allowed to be displayed on the sub screen zone when a remaining time of the program corresponding the digest view, obtained based on the receiving-time information, is long than the reference time. The digest view is, however, inhibited from being displayed on the sub screen zone when the remaining time is equal to or shorter than the reference time.2010-04-08
20100088725Methods And Systems For Providing Information About Programs Available For Viewing - A user interface is presented on a monitor of a media device for providing information about available programs. The user interface includes an array having three columns (channel, current show, and next show) with commonly aligned rows. Each row of the channel column includes an indicator. Each row of the current show column includes a title naming a program currently available on a channel of the media device corresponding to the indicator in a commonly aligned row of the channel column. Each row of the next show column includes a title naming a show available after the current program on the same channel. The currently available program may be displayed on the monitor in response to a viewer selected row, indicator, and/or title in the array.2010-04-08
20100088726AUTOMATIC ONE-CLICK BOOKMARKS AND BOOKMARK HEADINGS FOR USER-GENERATED VIDEOS - A system and method are disclosed for processing a video item to automatically provide or recommend bookmarks and bookmark headings for the video item. In one embodiment, the video item is first logically segmented into a number of segments. For each segment of the video item, a bookmark linking to a start of the segment of the video item is generated. In addition, audio and/or video content of each segment of the video item is processed in order to generate one or more recommended headings, or titles, for the corresponding bookmark. Information identifying the recommended bookmarks and bookmark headings may then be returned to an owner of the video item. The owner may then provide user input accepting, modifying, or rejecting the bookmarks and bookmark headings. Based on the user input from the owner, the bookmarks and bookmark headings for the video item are finalized and stored.2010-04-08
20100088727COMPUTATIONAL RECOMMENDATION ENGINE - A computational recommendation engine is described. In embodiment(s), identifiers of ranked programs can be distributed to television client devices, and then a viewing vector from each of the television client devices can be received where the viewing vectors indicate which of the ranked programs have been displayed for viewing at different ones of the television client devices. A client devices group can be created that includes a subset of the television client devices based on the viewing vectors that are received from respective ones of the television client devices. A ranked program can be determined that has not been displayed for viewing by some of the television client devices in the client devices group, and a recommendation of the ranked program can be communicated to the television client devices in the client devices group that have not had the ranked program displayed for viewing.2010-04-08
20100088728MEDIA CHANNEL SELECTION - A media control system processes a numeric user input to identify a set of alphabetic letters. The media control system selects a plurality of media channel names based on the set of alphabetic letters. The media control system generates a first signal to drive a first display of the media channel names. The media control system processes additional user input to select one of the displayed media channel names. The media control system generates a second signal to drive a second display associated with a media channel identified by the selected one of the displayed media channel names.2010-04-08
20100088729Microwave frequency satellite signal reception installation - The present invention relates to an installation for receiving microwave frequency radio satellite signals, said installation comprising a first electric adder to add a first electrical signal representative of a radio signal according to a first polarization and transposed to a first intermediate band and a second electrical signal representative of a radio signal according to a first polarization and transposed to a second intermediate band and a second electric adder to add a first electrical signal representative of a radio signal according to a second polarization and transposed to the first intermediate band and a second electrical signal representative of a radio signal according to a second polarization and transposed to a second intermediate band.2010-04-08
20100088730HYBRID AUDIO/VIDEO ENTERTAINMENT SYSTEM - A television entertainment system that combines the visual imagery of television entertainment and transmission with the audio of radio entertainment and transmission to create a new synthesis system for therapeutic benefit designated as Hybrid Radio Television. Each segment (video/audio) of the system can be viewed or heard/listened to on its own, however, it is designed to be viewed and heard/listened to as an integrated whole, as selected by a viewer.2010-04-08
20100088731ADAPTABLE CONFIGURATION PLUG IN A VEHICLE ENTERTAINMENT SYSTEM - A multimedia delivery system of a vehicle is provided comprising a passive configuration plug designed as a line-replaceable unit that permits quick and easy reconfiguration based on changing needs of the vehicle owner. The system comprises a plurality of multimedia servers comprising multimedia data files, a plurality of end user display devices that display information from the multimedia servers, and a configuration plug designed as a line-replaceable unit comprising: a frame, one or more covers connected to the frame, a plug mount comprising an end-user device plug and a server plug, wherein both the device plug and the server plug each contain a plurality of cable connectors, a plurality of cables, each connecting to a connector of the device plug on one end, and a connector of the server plug on an other end, the connections defining a cable mapping between the devices and the servers.2010-04-08
20100088732METHOD AND APPARATUS FOR USING SERVICE BASED ON OBJECTS FOR IMPLEMENTING DIFFERENT FUNCTIONS OF SERVICE - Provided are a method and apparatus for generating a plurality of objects for implementing different functions related to a service provided via a home network; and using the service based on the plurality of objects.2010-04-08
20100088733DISTRIBUTED AUDIO AND VIDEO PROCESSING - A method of distributing audio and video processing tasks among devices interconnected to a display device via a local network is disclosed. In one embodiment, the display device offloads some processing tasks to a computing device on the local network to achieve improved processing performance. The computing device receives audiovisual data, decodes, processes, encodes and transmits the encoded data to the display device in a suitable data format. The processing in the computing device is complementary to any processing to be performed in the display device. In another embodiment, the display device utilizes a plurality of devices on the local network to perform particular signal processing tasks. The other devices in network perform the processing tasks indicated by the display, and send processed data back to the display device for presentation, which helps improve the overall audiovisual data processing performance.2010-04-08
20100088734RECEPTION APPARATUS, RECEPTION METHOD, AND SERVER APPARATUS - A reception apparatus includes an acquisition section and a transmission section. The acquisition section acquires program information containing an ID that is assigned to a broadcast program by a broadcaster and a broadcast date and time. The transmission section transmits, to a server apparatus that manages the broadcast program using identification information formed by combination of the ID and the broadcast date and time, a request containing the identification information formed by combination of the ID and the broadcast date and time that are contained in the program information.2010-04-08
20100088735Video Branching - In certain implementations, a method of displaying a branched chain of Internet Protocol Television (IPTV) video content involves providing a first stream of video content, the first stream of video content having a plurality of video features that appear during a plurality of associated time intervals in the first stream of video content; providing a collection of affiliate video streams related to the plurality of time intervals; providing a set of metadata that associates the time intervals with one of the plurality of affiliate video streams; playing the first stream of video content on an IPTV compatible player device to sequentially reveal the plurality of features of the first stream in their respective time relationships in the first stream via a display driven by the IPTV compatible player device; at the IPTV compatible player device, receiving a selection signal during the associated time interval that selects the video feature being displayed; upon receipt of the selection signal, the IPTV compatible player device accessing the metadata to identify a particular one of the collection of affiliate data streams that is associated with the time interval of the selected video feature; and the IPTV compatible player device ceasing to play the first stream of video content and beginning playing the associated one of the collection of affiliate data streams that is associated with the time interval of the selected feature; whereby, the viewer directly navigates from one stream of video content to an affiliate video. This abstract is not to be considered limiting, since other embodiments may deviate from the features described in this abstract.2010-04-08
20100088736ENHANCED VIDEO PROCESSING FUNCTIONALITY IN AUXILIARY SYSTEM - According to example configurations herein, a downstream video processor operates in conjunction with an existing consumer-operated tuner system. The downstream video processor system can be an add-on system disposed in a communication link between the consumer-operated tuner system and a remote video playback device such as a hi-definition television. In lieu of processing video data locally in the set-top box, the consumer-operated tuner system can transmit the video data to the downstream video processor for processing. The downstream video processor in the communication link can be configured to provide enhanced video processing services (e.g., better resolution, higher frame rate rates, enhanced signal to noise ratio, enhanced color quality, 3-D graphics, etc.) with respect to video processing services supported by an upstream video decoder in the consumer-operated tuner system.2010-04-08
20100088737INFORMATION PROCESSING DEVICE AND CONTROL METHOD - An information processing device including, a receiving unit to receive video data from a server, a reproducing unit to reproduce the received video data and to display a video on a displaying unit, and a transmitting unit to transmit, to said server, a video title of the video data reproduced by the reproducing unit and reproducing time information representing a period of reproducing time of the video data reproduced by the reproducing unit.2010-04-08
20100088738Global Object Access Auditing - Global object access auditing techniques are described. In an implementation, a global SACL for a resource and an object SACL are merged to form a merged SACL responsive to a request for access to an object. The merged SACL is checked to determine what activity is to generate an audit event.2010-04-08
20100088739Hardware Based Mandatory Access Control - Hardware mechanisms are provided for performing hardware based access control of instructions to data. These hardware mechanisms associate an instruction access policy label with an instruction to be processed by a processor and associate an operand access policy label with data to be processed by the processor. The instruction access policy label is passed along with the instruction through one or more hardware functional units of the processor. The operand access policy label is passed along with the data through the one or more hardware functional units of the processor. One or more hardware implemented policy engines associated with the one or more hardware functional units of the processor are utilized to control access by the instruction to the data based on the instruction access policy label and the operand access policy label.2010-04-08
20100088740Methods for performing secure on-line testing without pre-installation of a secure browser - Methods for performing secure on-line testing without the need for pre-installation of a secure browser are provided. The methods use a general purpose web browser which is already installed on the user's computer and extend the browser so as to restrict the functionality of the user's computer in at least one way which makes the computer more secure with regard to testing. The extending occurs through the transmission of trusted code to the user's computer over the internet. The elimination of the need for pre-installation represents a major savings to school districts in terms of the amount of IT professional time that must be dedicated to on-line testing, especially for school districts having large numbers of installed computers. Apparatus for practicing the methods is also provided.2010-04-08
20100088741METHOD FOR DEFINING A SET OF RULES FOR A PACKET FORWARDING DEVICE - There are methods and apparatus, including computer program products, for defining a policy including a set of rules for a packet forwarding device by receiving information sufficient to enable a first rule related to one of security or traffic management to be defined, and based on the received information, enabling a corresponding second rule related to the other one of security or traffic management to be defined.2010-04-08
20100088742APPARATUS FOR DEFINING A SET OF RULES FOR A PACKET FORWARDING DEVICE - There are methods and apparatus, including computer program products, for defining a policy including a set of rules for a packet forwarding device by receiving information sufficient to enable a first rule related to one of security or traffic management to be defined, and based on the received information, enabling a corresponding second rule related to the other one of security or traffic management to be defined.2010-04-08
20100088743PERSONAL-INFORMATION MANAGING APPARATUS AND PERSONAL-INFORMATION HANDLING APPARATUS - A personal-information managing apparatus includes: a usage permission policy managing unit to manage usage permission policy in which a boundary between usage permission and usage prohibition of personal information is defined; a personal information request receiving unit to receive a request for the personal information from the personal-information handling apparatus; a usage-permission issuing unit to obtain the usage permission policy corresponding to the received request via the usage permission policy managing unit, and to issue a usage permit corresponding to the usage permission policy and the requested personal information to the personal-information handling apparatus; a usage permit issue history managing unit to manage the issued usage permit and usage permission issue history relating to the personal information; and a credibility establishing unit to establish credibility of information exchange with the personal-information handling apparatus in relation to the issuing of the usage permit and the personal information.2010-04-08
20100088744System For Online Compromise Tool - An Activity Access Control (AAC) utility controls access to applications and devices by allowing an administrator to set terms of use/access regarding a applications and/or devices for a group of users, whose activity are monitored. The AAC utility also enables administrator and user access to a compromise facility via a centralized access point to establish or request changes to the terms of use/access. The AAC utility allows the administrator to dynamically update information and set terms based on real-time information collected during activity monitoring. Dynamic updates may also occur based on the monitored user's request, the priority of the requesting user(s), historical data, occurrence of a special event, completion of other internal or/external tasks, and/or pre-set limitations or thresholds. In addition, the AAC utility facilitates the real-time display or publishing of the terms of use, status information, and statistical information to users and the administrator.2010-04-08
20100088745METHOD FOR CHECKING THE INTEGRITY OF LARGE DATA ITEMS RAPIDLY - The embodiments read, by a computer, target data and divide the target data into chunks. Initial digest values for each chunk of the target data are maintained. Digest values for a subset of the chunks, based upon the target data, is obtained. And a computer compares the obtained subset of digest values of the target data with corresponding subset of maintained initial digest values and verifies integrity of the target data according to the comparison.2010-04-08
20100088746SECURE EBOOK TECHNIQUES - A computing system for delivering content includes one or more servers communicatively coupled to one or more ebooks. A given ebook may send a request for content at a specified location to a server. The request is received at the server with an identifier of the given ebook and/or user. The server determines if the ebook can access the content at the specified location based on the identifier of the ebook and/or user. If the ebook and/or user are allowed to access the content, the server streams a predetermined portion of the content to the ebook for display to a user.2010-04-08
20100088747Identification and Verification of Peripheral Devices Accessing a Secure Network - A system and method for identifying and verifying a client to access a secure network. Timing characteristics are acquired from the client, such as a peripheral device, and further verified and identified via a policy enforcement points and a policy decision points, or a measurer device in the secure network.2010-04-08
20100088748Secure peer group network and method thereof by locking a mac address to an entity at physical layer - A system and method of locking media access control (MAC) address of each entity to the entity's identity for formation of a secure peer group is disclosed. The identity of each entity includes at least the public key from the public-private key pair from public key infrastructure (PKI) and the entities' MAC address. Using the unique identifying features a security server links and locks the MAC address of the entity to its identity so that no other entity can identify itself as the owner of that MAC address to the secure server. A group of such entities and secure server with locked MAC addresses form a qualified and verifiable secure peer group enabled to establish a secure LAN.2010-04-08
20100088749SYSTEM AND METHOD FOR PERSONAL AUTHENTICATION USING ANONYMOUS DEVICES - A system and method for providing personal authentication is provided. The method comprises the steps of prompting a user of an electronic communication device to provide transaction or session input; establishing a session if the transaction or session input is valid; requesting electronic communication device to establish communication with one or more identity modules and one or more anonymous devices in the vicinity, if the electronic communication device is authorized; interrogating one or more identity modules and one or more anonymous device via electronic communication device and authentication server, after the communication is established between the electronic communication device, one or more identity modules and one or more anonymous devices; and activating the electronic communication device if the one or more identity modules and one or more anonymous devices are authenticated by the authentication server.2010-04-08
20100088750TERMINAL APPARATUS, SERVER AND SYSTEM THEREOF - A terminal apparatus is provided which can guarantee operation of a use condition bytecode while securing the degree of freedom for a service provider generating the use condition bytecode. A terminal apparatus (2010-04-08
20100088751COMMUNICATION SYSTEM, TERMINAL CONTROL UNIT AND COMMUNICATION METHOD - A terminal control unit and method are provided. The terminal control unit which manages information about a mobile unit which transmits data to a relay unit of transferring data to another relay unit depending on source IP address, includes a terminal communication information storing unit which stores a destination IP address and a terminal identifier for identifying the mobile unit for every relay unit; and a terminal identifier transmitting unit which transmits a combination of the destination IP address and the terminal identifier stored in the terminal communication information storing unit to the mobile unit, upon receipt of a terminal identifier assignment request from the mobile unit, requesting assignment of the terminal identifier to the mobile unit.2010-04-08
20100088752Identifier Binding for Automated Web Processing - A process for the automatic handling of requests has a first step of receiving a session request, which results in the issuance of a session token. Upon receipt of a content transfer message accompanied by the previously issued session token, a routing tuple identifying a sender, receiver, and type, the content transfer message also containing content to be transferred, the routing tuple is compared to entries in a process table which resolves into an action and destination. The action and destination associated with the routing tuple and request type are performed if a match is found, or a default action is taken if no match is found, such as placing the content in a user INBOX for future handling. Additionally, the later actions the user takes on the INBOX are examined, and new entries are created in the process table based on the user actions.2010-04-08
20100088753IDENTITY AND AUTHENTICATION SYSTEM USING ALIASES - An identity and authentication platform utilizes a data model that enables multiple identities such as e-mail addresses, mobile phone numbers, nicknames, gaming IDs, and other user IDs to be utilized as aliases which are unique sub-identities of a main account name. A user may utilize the aliases supported by the platform to project multiple different on-line identities while using the authentication credentials of the main account. The platform is configured to expose the aliases to various client applications and Internet-accessible sites and services such as e-mail, instant messaging, media sharing, gaming and social networks, and the like, to enable the implementation of a variety of usage scenarios that employ aliases.2010-04-08
20100088754Authentication Method and Token Using Screen Light for Both Communication and Powering - An authentication token one side of which features an array of solar cells, of a very thin and flexible type, whereas the opposite side features a display device. The method consists in encoding into a sequence of bright images, interlaced with less bright ones, the code sent by the server. By placing the token in front of the portion of the screen displaying said encoding sequence, the light collected by the array of solar cells it is sufficient to generate the energy required for supplying the token's microprocessor, while the variation in brightness are decoded as to reconstruct the digital word representing the code sent by the server. Said code is then processed by the microprocessor to generate a One Time Password, OTP, then displayed on the display device. The user would then enter said OTP on the login page.2010-04-08
20100088755Access management for devices in communication networks - The invention relates to a terminal a node and a method for terminating communication between a communication network (2010-04-08
20100088756MULTI-PATTERN PACKET CONTENT INSPECTION MECHANISMS EMPLOYING TAGGED VALUES - Methods and apparatus for performing content inspection using multi-pattern packet content inspection mechanisms employing tagged values. Pattern data structures are employed to facilitate multi-pattern searches via corresponding string-search algorithm machines. The pattern data structures include tagged values defining search offsets and depths for corresponding search patterns. Incoming packets are classified to flows, and stored in corresponding flow queues. Flow table entries are used to identify the pattern data structure for a given flow. During content inspection, the algorithm machine employs the tagged values to effectively skip portions of a data stream up to the offset for each search pattern and to cease searching for a pattern upon reaching the depth for the pattern.2010-04-08
20100088757VIRTUALIZED SECURE NETWORKING - The invention provides a data processing system for the support of secure networking on a single, virtualized hardware platform. The data processing system comprises a Network Interface Controller NIC to control access to a physical network; a first operating system comprising an NIC driver to manage the NIC, and a first Virtual Network Interface Controller VNIC driver. The system further comprises at least one second operating system comprising at least one second VNIC driver associated with a networking stack; and a Virtual Machine Monitor VMM to enable concurrent operation of the first and second operating systems, and to emulate a virtual network, the VMM comprising first and second VNICs to provide access to the virtual network by the first and second operating systems through the first and second VNIC drivers, respectively. The first operating system further comprises a bridge driver in between the NIC driver and the first VNIC driver to manage the connection between the physical network and the virtual network.2010-04-08
20100088758SECURITY SYSTEM, SECURITY METHOD AND RECORDING MEDIUM STORING SECURITY PROGRAM - A security system to give a user in a specific area use authority based on authentication, and to permit use of the specific area by the use authority. The security system includes an authentication unit to authenticate a user, a position detection unit to detect at least one of a position and move of a user, and a use authority control unit to monitor at least one of a position and move of a user to whom the use authority is given based on the authentication of the authentication unit by a detection output of the position detection unit, and, if a distance between users is equal to or below a predetermined value, to change the use authority which is given to each user.2010-04-08
20100088759DEVICE-SIDE INLINE PATTERN MATCHING AND POLICY ENFORCEMENT - Inline pattern matching and policy enforcement may be implemented by a memory storage device. In an example embodiment, a device-implemented method includes acts of receiving, intercepting, and performing and conditional acts of invoking or permitting. A request from a host to perform a memory access operation is received at a memory storage device. Data flowing between an I/O channel and physical storage of the memory storage device is intercepted. A pattern matching procedure is performed on the data with reference to multiple target patterns in real-time while the data is being intercepted. If a pattern match is detected between the data and a target pattern, a policy enforcement mechanism is invoked. If a pattern match is not detected between the data and the multiple target patterns, the request from the host to perform the memory access operation is permitted.2010-04-08
20100088760DEBUG SECURITY LOGIC - A system comprises debug logic usable to debug the system. The system also comprises processing logic capable of accessing the debug module using electronic signals. The system further comprises security logic configured to prevent the processing logic from accessing the debug logic unless the security logic is provided with a passkey that matches another passkey stored in the system.2010-04-08
20100088761CROSS-DOMAIN ACCESS PREVENTION - A method, system, and computer program product for cross-domain access prevention are provided. The method includes detecting a request from a first domain to access a second domain, and applying cross-domain access heuristics to determine whether to allow the request. The cross-domain access heuristics define common ownership characteristics between the first domain and the second domain. The method further includes performing the requested access in response to determining that the request complies with at least one of the cross-domain access heuristics, and blocking the requested access in response to determining that the request fails to comply with the cross-domain access heuristics.2010-04-08
20100088762APPARATUS AND METHOD FOR MONITORING NETWORK EQUIPMENT - A system that incorporates teachings of the present disclosure may include, for example, a server having a controller to receive a monitoring signal from a network plug-in device where the monitoring signal includes location and identification information associated with the network plug-in device and where the server is remote from the network plug-in device, and determine whether the network plug-in device is in an unauthorized location based at least in part on the monitoring signal. Other embodiments are disclosed.2010-04-08
20100088763Method for Preventing Denial of Service Attacks Using Transmission Control Protocol State Transition - Disclosed is a method of preventing a denial of service (DoS) attack using transmission control protocol (TCP) state transition. Flow of packets transmitted between a client and a server using TCP is monitored to prevent the DoS attack, e.g., SYN flooding, and to efficiently reduce the load on the server and provide mor secure service. By applying the method to a firewall, a proxy server, an intrusion detection system, etc., of a server, it is possible to make up for vulnerabilities regarding a DoS attack without disturbing a conventional TCP state transition operation and detect, verify and block DoS attacks abusing the vulnerabilities, thereby providing more secure service.2010-04-08
20100088764RELAY DEVICE AND RELAY METHOD - An apparatus relays packets transferred over a network and discards an attack packet detected among the packets. The apparatus includes: an inspection-packet outputting unit that outputs, when detecting the attack packet, an inspection packet in which a transmission-source address contained in the attack packet is set as a destination address and a destination address contained in the attack packet is set as a transmission-source address; a filter table storing unit that stores, when acquiring a response packet for the inspection packet, a transmission-source address, a destination address, and identification information of an interface, which has received the response packet, that are contained in the response packet, in a filter table in an associated manner; and a transfer control unit that determines whether to transfer a packet as a transfer object based on the filter table.2010-04-08
20100088765SYSTEM AND METHOD FOR FILTERING ELECTRONIC MESSAGES USING BUSINESS HEURISTICS - Disclosed are systems and methods for use in filtering electronic messages using business heuristics. In one aspect, a method includes determining whether the electronic message is associated with a desirable business, and adjusting the likelihood of delivering the electronic message to an intended recipient of the message if the electronic message is determined to be associated with the desirable business. In a more specific embodiment, the method further includes assigning a spam-score to the electronic message based on a likelihood that the electronic message is not unwanted by the intended recipient, blocking delivery of the electronic message to the intended recipient when the spam-score does not cross an overall threshold, and delivering the electronic message to the intended recipient based on the adjusted likelihood when the electronic message is determined to be associated with the desirable business.2010-04-08
20100088766METHOD AND SYSTEM FOR DETECTING, BLOCKING AND CIRCUMVENTING MAN-IN-THE-MIDDLE ATTACKS EXECUTED VIA PROXY SERVERS - A method for detecting and blocking a Man-in-the-Middle phishing attack carried out on a client connection which has been fraudulently routed through an anonymous proxy server. An agent downloaded to the client device opens a client direct connection to the security host protecting against the attack and sends a client direct connection ID to the security host for validation. By comparing IP addresses correlated via the validated client direct connection ID, the security host determines whether the original connection is direct (secure) or indirect (attack via phishing proxy). The detection and blocking can be performed by the service provider's server or by a third-party validation server handling all security without additional requirements on the service provider server. In addition to detecting and blocking such attacks, methods for client direct connection ID, as well as automatic transparent and seamless attack circumvention and preemptive circumvention are disclosed.2010-04-08
20100088767TARGET-BASED SMB AND DCE/RPC PROCESSING FOR AN INTRUSION DETECTION SYSTEM OR INTRUSION PREVENTION SYSTEM - A method performed in a processor of an intrusion detection/prevention system (IDS/IPS) checks for valid packets in an SMB named pipe in a communication network. In a processor configured as an IDS/IPS, a packet in a transmission is received and a kind of application of a target of the packet is determined. Also, the data in the packet is inspected by the IDS/IPS as part of the SMB named pipe on only one of a condition that: (a) the FID in an SMB command header of the packet is valid (i) for segments/fragments in the SMB named pipe and (ii) for the determined kind of application of the target of the packet, as indicated by a reassembly table, and (b) the determined kind of application of the target of the packet does not check the FID, as indicated by the reassembly table.2010-04-08
20100088768INDUSTRIAL PROCESS VISUALIZATION APPLICATION HAVING AN OPERATING SYSTEM LOCALE-BASED REGIONALLY LIMITED LICENSE - A computer system and method are described for enforcing a locale-based license restriction by a process visualization application program. A locale-based license configuration is read from a license file associated with the process visualization application program. An operating system application program interface is called to identify a current locale of the operating system. The current locale affects a language utilized to present text via a graphical user interface display. Thereafter, a locale specified by the locale-based license configuration is compared to the current locale of the operating system. Thereafter, a licensing result is generated representing success or failure based upon whether the locale specified by the locale-based license configuration matches the current locale of the operating system. The aforementioned steps are carried out in a computer system including a computer-readable medium having computer-executable instructions for carrying out the above-described steps.2010-04-08
20100088769PREVENTING EXECUTION OF TAMPERED APPLICATION CODE IN A COMPUTER SYSTEM - Methods and systems for preventing an application which has been maliciously or inadvertently tampered with from causing harm to a computer system are described. Application code of the tampered application is inputted into a code analyzer. The code is analyzed and functions within the application code are identified and examined. Multiple profiles are created and each identified function is assigned a profile. A profile may be a description of how a function is intended to operate, that is, the function's expected behavior. Multiple replacement functions are created using a first set of functions, where each function is called by the identified functions and a second set of functions where each function in the second set calls the identified function. Calls between functions are examined and a called function is replaced with a replacement function, such that a call to an original function results in a call to the replacement function. The original function is unaware that it is not getting function calls or that such calls are being directed to a replacement function or stub. A replacement function contains code to ensure that the user space maintains its original appearance.2010-04-08
20100088770DEVICE AND METHOD FOR DISJOINTED COMPUTING - A method and system are described for processing an extended information element, the extended information element being composed of a word component and a stamp component, by a computing system that can transfer the extended information element but cannot manipulate the stamp component of the extended information element. The method includes: providing a stamp processing system for manipulating the stamp component, processing a value of the stamp component by the stamp processing system, and controlling an operation on the word component based on the value of the stamp component.2010-04-08
20100088771VIRTUALIZATION OF A CENTRAL PROCESSING UNIT MEASUREMENT FACILITY - A central processing unit measurement facility is virtualized in order to support concurrent use of the facility by multiple guests executing within a virtual environment. Each guest of the environment has independent control over disablement/enablement of the facility for that guest.2010-04-08
20100088772SECURE SYSTEM AND APPARATUS FOR DATA DELIVERY - A system and apparatus for data delivery facilitates secure and controlled delivery of digital information, particularly in the context of an event, but also in the context of commercial and educational forums and the like. Preferably an administrator is positioned between parties wishing to share digital information and parties wishing to obtain such information. The administrator ensures that the digital information falls within certain security and formatting criteria so that parties may obtain the information without fear of damage to or abuse of their computing devices.2010-04-08
20100088773MUTATIONS IN LAMA2 GENE OF ZEBRAFISH - The present invention relates to an isolated nucleic acid molecules encoding mutant lama2 gene of zebrafish, mutant zebrafish having mutations in the lama2 gene, fish models containing mutant zebrafish, and uses of the fish models.2010-04-08
20100088774CHARACTERIZATION OF GRANULOCYTIC EHRLICHIA AND METHODS OF USE - The present invention relates, in general, to granulocytic ehrlichia (GE) proteins. In particular, the present invention relates to nucleic acid molecules coding for GE S2, S7, S22, S23, C6.1, C6.2, S11, E8, E46#1, and E46#2 proteins; purified GE S2, S7, S22, S23, C6.1, C6.2, S11, E8, E46#1, and E46#2 proteins and polypeptides; recombinant nucleic acid molecules; cells containing the recombinant nucleic acid molecules; antibodies having binding affinity specifically to GE S2, S7, S22, S23, C6.1, C6.2, S11, E8, E46#1, and E46#2 proteins and polypeptides; hybridomas containing the antibodies; nucleic acid probes for the detection of nucleic acids encoding GE S2, S7, S22, S23, C6.1, C6.2, S11, E8, E46#1, and E46#2 proteins; a method of detecting nucleic acids encoding GE S2, S7, S22, S23, C6.1, C6.2, S11, E8, E46#1, and E46#2 proteins or polypeptides in a sample; kits containing nucleic acid probes or antibodies; bioassays using the nucleic acid sequence, protein or antibodies of this invention to diagnose, assess, or prognose a mammal afflicted with ehrlichiosis; therapeutic uses, specifically vaccines comprising S2, S7, S22, S23, C6.1, C6.2, S11, E8, E46#1, and E46#2 proteins or polypeptides or nucleic acids; and methods of preventing or inhibiting ehrlichiosis in an animal.2010-04-08
20100088775METHODS OF MODULATING EPITHELIAL-MESENCHYMAL TRANSITION AND MESENCHYMAL-EPITHELIAL TRANSITION IN CELLS AND AGENTS USEFUL FOR THE SAME - The present invention relates generally to the fields of treatment, prophylaxis and diagnosis of cell-based and fibrotic conditions in animals including mammals. More particularly, the present invention contemplates the use of agents which modulate epithelial-mesenchymal transition (EMT) processes and mesenchymal-epithelial transition (MET) processes and hence are useful in the treatment of a range of conditions including inhibiting metastasis of solid tumors and the development of fibrosis, treating metastatic disease and in promoting wound healing. Diagnostic protocols to assess EMT and MET or its stage of development also form part of the present invention. The EMT and MET modulating agents are also useful in regulating gene expression and, hence, represent useful therapeutic and research tools.2010-04-08
20100088776PROCESSES FOR PRODUCING POLYUNSATURATED FATTY ACIDS IN TRANSGENIC ORGANISMS - The present invention relates to polynucleotides from 2010-04-08
20100088777Methods For Increasing The Resistance In Plants To Biotropic Fungi - The present invention relates to methods of generating or increasing resistance to at least one biotrophic pathogen in a plant or a part of a plant by increasing the protein quantity or function of at least one Bax Inhibitor-1 (BI-1) protein in at least one part of the plant. Moreover, the invention relates to polypeptide sequences and nucleic acid sequences which code for a BI-1 protein, and to expression cassettes, vectors and organisms which comprise such sequences or such a protein.2010-04-08
20100088778Methods of Treatment, and Diagnosis of Epilepsy by Detecting Mutations in the SCN1A Gene - A method for the diagnosis of an epilepsy syndrome, including SMEI or an SMEI-related syndrome, in a patient comprising testing for an alteration in the SCN1A gene in a sample obtained from the patient; and if an alteration is identified, comparing said alteration to any one of those listed in Table 3, wherein if said alteration is identical to any one of those listed in Table 3, a diagnosis of an epilepsy syndrome, including SMEI or an SMEI-related syndrome, in said patient is made in accordance with the correlation set forth in Table 3.2010-04-08
20100088779Loblolly pine tree named '01PM0212' - A new and distinct variety of loblolly pine tree named ‘01PM0212’, particularly characterized by uniform rapid growth; good stem straightness; moderate rust resistance; and moderate to long internode.2010-04-08
20100088780Convenient Method for Inhibition of Gene Expression Using RSIS - The present inventors identified RSIS, and succeeded in suppressing the expression of a target gene by linking RSIS between the region from the promoter to mRNA 5′ end sequence of a target gene and a terminator sequence including the 3′UTR after the stop codon. Furthermore, the inventors demonstrated that the expression of two different genes could be suppressed at the same time in cells where a promoter was active, by using the promoter and terminator derived from different genes, and a portion of the mRNA of each gene.2010-04-08
20100088781ALTERING CAROTENOID PROFILES IN PLANTS - A method for altering the level of one or more carotenoids in a plant or a tissue within the plant is provided. Method comprises introducing a nucleic acid sequence comprising a regulatory region operatively associated with a silencing nucleotide sequence that reduces or eliminates the expression of a lycopene epsilon cyclase into the plant, and expressing the silencing nucleotide sequence. Expression of the sequence reduces the level of the lycopene epsilon cyclase in the plant or within a tissue of the plant, and results in altering one or more carotenoids.2010-04-08
20100088782SEED ENHANCEMENT BY COMBINATIONS OF PYRUVATE KINASES - Described herein are inventions in the field of genetic engineering of plants, including combinations of nucleic acid molecules encoding pyruvate kinase subunits to improve agronomic, horticultural, and quality traits. This invention relates generally to the combination of nucleic acid sequences encoding pyruvate kinase proteins that are related to the presence of seed storage compounds in plants. More specifically, the present invention relates to the use of these combinations of these sequences, their order and direction in the combination, and the regulatory elements used to control expression and transcript termination in these combinations in transgenic plants. In particular, the invention is directed to methods for manipulating seed storage compounds in plants and seeds. The invention further relates to methods of using these novel combinations of polypeptides to stimulate plant growth and/or root growth and/or to increase yield and/or composition of seed storage compounds.2010-04-08
20100088783Nucleic acid molecules encoding sucrose synthase-like polypeptides and methods of use - Described herein are inventions in the field of genetic engineering of plants, including isolated nucleic acid molecules encoding Sucrose Synthase-like (S US-like) polypeptides to improve agronomic, horticultural, and quality traits. This invention relates generally to nucleic acid sequences encoding proteins that are related to the presence of seed storage compounds in plants. More specifically, the present invention relates to SUS-like nucleic acid sequences encoding sugar and lipid metabolism regulator proteins and the use of these sequences in transgenic plants. In particular, the invention is directed to methods for manipulating sugar-related compounds and for increasing oil level and altering the fatty acid composition in plants and seeds. The invention further relates to methods of using these novel plant polypeptides to stimulate plant growth and/or to increase yield and/or composition of seed storage compounds.2010-04-08
20100088784SUGAR AND LIPID METABOLISM REGULATORS IN PLANTS III - Isolated nucleic acids and proteins associated with lipid and sugar metabolism regulation are provided. In particular, lipid metabolism proteins (LMP) and encoding nucleic acids originating from 2010-04-08
20100088785COMPOSITIONS AND METHODS FOR MODULATING EXPRESSION OF GENE PRODUCTS - Compositions and methods for modulating expression of gene products are provided. Compositions comprise suppression cassettes that comprise a convergent promoter pair operably linked to a silencing element that, upon expression, is capable of decreasing the expression of one or more target polynucleotides of interest. Compositions of the invention also include transformed plants, plant cells, plant tissues, and plant seeds. Methods of transformation and regeneration of plants comprising the novel constructs are provided. The methods find use in regulating gene expression, particularly genes associated with agronomic traits of interest. Further provided are promoter sequences, cells, plants, and vectors comprising these promoter sequences and methods of their use.2010-04-08
20100088786LEAF-SPECIFIC CHLOROPHYLL A/B BINDING PROTEIN GENE PROMOTER FROM OIL PALM - The present invention discloses a promoter sequence of light-harvesting chlorophyll a/b binding protein pGWLS01 isolated from the oil palm leaf. This promoter enables the manipulation of oil palm leaves for the production of high value-added products via genetic engineering tools. The novel features of the promoter itself which regulate high and specific expression of foreign genes in the leaves will avoid the interference of novel products in the commodity oil extracted from mesocarp and kernel tissues. Furthermore, the promoter is also potentially useful in the production of insect-resistant palm.2010-04-08
20100088787PUMP PROBE MEASURING DEVICE AND SCANNING PROBE MICROSCOPE APPARATUS USING THE DEVICE - A pump probe measuring device (2010-04-08
20100088788STRESS MICRO MECHANICAL TEST CELL, DEVICE, SYSTEM AND METHODS - The invention provides a stress micro mechanical system for measuring stress and strain in micro- and nano-fibers tubes, and wires as well as for measuring the interface adhesion force and stress in nanofibers and nanotubes embedded in a polymer matrix. A preferred system of the invention has a substrate for supporting a MEMS fabrication. The MEMS fabrication includes freestanding sample attachment points that are movable in a translation direction relative to one another when the substrate is moved and a sample is attached between the sample attachment points. An optical microscope images surfaces of the MEMS fabrication. Software conducts digital image correlation on obtained images to determine the movement of the surfaces at a resolution much greater than the hardware resolution of the optical microscope. A preferred method for measuring stress and strain in micro- and nano-fibers, tubes, and wires, and/or measuring the force required to pull-out individual micro- and nano-fibers, tubes, and wires from a polymer matrix and to therefore measure interfacial adhesion is also provided. In the method a sample is attached between freestanding platforms in a MEMS device. Relative translational movement between the platforms is created and motion of the platforms is imaged with an optical microscope. Mechanical and adhesion properties of the sample are determined by applying a digital image correlation algorithm to the image data.2010-04-08
20100088789MINI SHRUB ROSE PLANT NAMED 'MEISILIMOND' - A new and distinct variety of Mini Shrub Rose plant is provided that forms in abundance on a substantially continuous basis single blossoms that are light pink to white in coloration. The buds are pointed. The vegetation is vigorous and the growth habit is small low-growing, round, and bushy. The foliage is of an attractive light green coloration, bears a matte finish, and contrasts nicely with the light pink to white blossom coloration. The disease resistance is above average for the class with respect to Black Spot. The plant is particularly well suited for providing attractive ornamentation.2010-04-08
20100088790ROSE PLANT NAMED 'BENOCHO' - This new rose plant is of a medium size and upright growing habit. It bears hybrid tea-form, white flowers with red margins, primarily one to a stem. The upper surface of those flowers may become entirely flushed with a deep red depending on the intensity of the sun. The plant makes an excellent decoration in the garden.2010-04-08
20100088791STRAWBERRY PLANT NAMED 'DRISSTRAWSEVEN' - This invention relates to a new and distinct cultivar of strawberry plant named ‘DrisStrawSeven’. The new cultivar is primarily characterized by its large, sweet tasting fruit, early harvest maturity, and resistance to powdery mildew is disclosed.2010-04-08
20100088792Eastern redbud tree 'JN2' - An Eastern Redbud tree named ‘JN2’ having golden orange new growth that does not burn, speckled lime green mature foliage, an improved vigor in heat and drought, and the capability of being reproduced reliably from budding.2010-04-08
Website © 2025 Advameg, Inc.