20th week of 2009 patent applcation highlights part 62 |
Patent application number | Title | Published |
20090125941 | IMAGE PROCESSING APPARATUS AND CONTROL METHOD THEREOF - A control method of an image processing apparatus which communicates with a server, the control method including: receiving image content including additional information; processing and displaying the received image content; receiving a selection signal to select an information searching function; transmitting the additional information of the image content to the server; and receiving at least one search word related to the image content from the server and generating a list. | 2009-05-14 |
20090125942 | Method and Apparatus for Providing Program Guide - A method and apparatus provide an on-screen program guide that uses its space in an efficient manner by shifting program information within the program guide by relatively small time increments. According to an exemplary embodiment, the apparatus includes a memory operative to store data that enables the program guide. A processor is operative to enable display of a portion of the program guide including program information covering a first time interval including a current time. The program guide has time information in a first axis and channel information in a second axis. The processor is further operative to cause the program information to be shifted along the first axis by a second time interval if an elapsed time equals the second time interval. The second time interval is less than thirty minutes. | 2009-05-14 |
20090125943 | Program guide optimization system - A method and system of optimizing strings comprised in program guide data for transmission is described. The method includes sharing, in the program guide data, a plurality of strings, each string among the plurality of strings including a shared sorting key, implementing an order access of a sorted sharing index, wherein the program guide data and the shared sorting key are comprised in the same data storage structure. Related methods and apparatus are also described. | 2009-05-14 |
20090125944 | NOVEL DIGITAL BROADCASTING VIEWING METHOD USING MY CHANNEL AND SYSTEM THEREOF - The present invention relates to a digital broadcasting viewing method. The method in accordance with the present invention is characterized in that a user can watch preference programs by selection of a particular virtual channel. The method of the present invention comprises the steps of (a) assigning at least one channel that is not allocated to broadcast regular programs by broadcasting stations as my channel, (b) bookmarking a program that a user wants to watch to the my channel based on a program guide information, and (c) in response to selection of the my channel by the user, displaying the bookmarked program on television screen of the user. Two or more channels may be assigned as my channel. Compared with the conventional method that allows only one channel to be reserved for the same time, the present invention makes it possible to reserve as many channels as the number of My Channels for the same time. By changing between the My Channels, the user can enjoy his/her preference programs without the complicated channel search. Since channel changing to the preference programs is carried out only by the user's My Channel selection, the interruption caused by automatic channel change in the conventional reservation system can be avoided. | 2009-05-14 |
20090125945 | Broadcast receiver, broadcast data transmitting method and broadcast data receiving method - A broadcast receiver, broadcast data transmitting method and broadcast data receiving method are disclosed, by which information on a service provided by a service provider can be provided, by which a preview can be provided, and by which a time taken for a channel switching can be reduced. The present invention includes transmitting service provider discovery information including information on a service provider, transmitting service discovery information including information on a service provided to the service provider, and transmitting a stream for the service to a connected receiver. | 2009-05-14 |
20090125946 | REMOTE CONTROL TERMINAL, INFORMATION ACQUIRING APPARATUS, INFORMATION PROVIDING APPARATUS, INFORMATION PROVIDING SYSTEM, INFORMATION PROVIDING METHOD, AND PROGRAM - A commander includes a program identification information acquiring unit which acquires program identification information to designate a program to be watched by a receiving terminal, a channel selection control unit which remote-controls a channel selecting process by the receiving terminal based on program identification information, a scenario information acquiring unit which acquires scenario information included in electronic content guide information related to the program from an ECG server based on the program identification information, a display unit which displays the scenario information related to the program, and a display control unit which can control a display of the scenario information to change a display state of the scenario information related to the program depending on a display state of the scenario information on the receiving terminal based on predetermined setting information or predetermined operation information. Therefore, efficient use and effective provision of program meta information can be obtained. | 2009-05-14 |
20090125947 | DIGITAL BROADCAST RECEIVING APPARATUS - A digital broadcasting receiver includes a digital tuning section having a plurality of tuners which receive digital broadcasting and output video signals of programs as well as a copy control signal, and a controller which selects one of video signals supplied from the tuners based on the copy control signal supplied from the digital tuning section. The foregoing structure allows the receiver to output the videos of programs free from intermittence at the beginning of the program of which copy control signal is switched from the previous one. | 2009-05-14 |
20090125948 | Communication Processing Based on Television Use - In one embodiment, a method includes receiving a first user profile comprising at least one rule associated with at least one show. The at least one rule is activated upon the occurrence of a first event. The method also includes detecting the occurrence of the first event. Upon detecting the occurrence of the first event, the method further includes activating the at least one rule and processing a first communication based on the at least one rule. | 2009-05-14 |
20090125949 | STREAM SUPPLYING APPARATUS, CONTENT REPRODUCING APPARATUS AND METHOD FOR REPRODUCING CONTENT - A stream supplying apparatus includes: a tuner that receives a broadcast signal; a decoder that decodes the broadcast signal and outputs the decoded broadcast signal as a data stream; a memory that stores apparatus information that pertains to the stream supplying apparatus; and a network interface that transmits the apparatus information stored in the memory to a content reproducing apparatus, which is connected to the stream supplying apparatus via a network, in response to a state collecting command output from the content reproducing apparatus. | 2009-05-14 |
20090125950 | METHOD AND SYSTEM FOR AUTHENTICATING A USER DEVICE - A system and method includes a user device having a subscriber activation client application stored therein. The user device prompts entry of an ordering identifier and receives the ordering identifier through a user interface. A subscriber activation system is in communication with the user device through a secure network. The subscriber activation system receives the ordering identifier from the user device. The subscriber activation system verifies the ordering information and generates an activation signal from the order identifier. The subscriber activation system communicates the activation signal to the user device to activate the user device. | 2009-05-14 |
20090125951 | SYSTEM AND METHOD FOR A PERSONAL VIDEO INBOX CHANNEL - A method of aggregating video content receives video content data related to video content, evaluates and aggregates this information, and subsequently forwards the aggregated information to a viewing client where it can be viewed by a user. In one embodiment, the video content data contains a Universal Resource Indicator (URI) that specifies to the viewing client the location of the video content. | 2009-05-14 |
20090125952 | METHOD AND APPARATUS FOR DELIVERING CONTENT BASED ON RECEIVERS CHARACTERISTICS - Media distribution systems may include methods and apparatus to perform memory management on a wireless devices configured to receive non-real time portions of media services. Such methods and apparatus may be based upon an allowable capacity of presentations storable in device memory, as well as on a required memory associated with each presentation in a media service. Such methods and apparatus allow a device to subscribe to a media service based upon sufficient available memory in the device to support the service. | 2009-05-14 |
20090125953 | SYSTEMS, METHODS AND GRAPHICAL USER INTERFACES FOR MONITORING AN INTERNET PROTOCOL TELEVISION (IPTV) NETWORK - Systems, methods and graphical user interfaces monitoring an Internet Protocol Television (IPTV) network are provided. A particular method includes receiving IPTV process data. The IPTV process data includes information about a plurality of processes executing at a plurality of servers of an IPTV distribution network. The method also includes analyzing the IPTV process data to determine process operational information. The process operational information is descriptive of the operation of at least a first process of the plurality of processes and operation of at least a second process of the plurality of processes. The method also includes generating a display based on the operational information. The display includes an aggregate display element representing the operation of the at least one first process and the operation of the at least one second process. | 2009-05-14 |
20090125954 | STREAMING VIDEO TRANSMISSION FROM PC TO REMOTE MONITOR - An apparatus and method to transfer streaming video from a personal computer to a remote monitor includes the personal computer reading a compressed streaming video data from a source, transmitting the compressed streaming video data to a remotely located Ethernet stream video converter, the Ethernet stream video converter decoding the compressed streaming video data and displaying the decoded streaming video data on a remote monitor connected to the Ethernet stream video converter. | 2009-05-14 |
20090125955 | METHODS, COMPUTER PROGRAM PRODUCTS, AND VIRTUAL SERVERS FOR A VIRTUAL COLLABORATIVE ENVIRONMENT - Methods, computer program products, and virtual servers for providing virtual service are provided. A user of a virtual service is authenticated. An input is received that identifies another user in which to operatively connect for virtual service. Permission is requested to operatively connect to the other user. The user is operatively connected to the other user, in response to receiving an acceptance to operatively connect from the other user. Acquired information is transmitted and received between the user and the other user, while broadcast content is being received by the user and the other user. The acquired information and the broadcast content may be displayed together on a television. | 2009-05-14 |
20090125956 | METHOD AND APPARATUS FOR UTILIZING AN AUDIBLY CODED SIGNAL TO CONDUCT COMMERCE OVER THE INTERNET - A method and apparatus for utilizing a coded audio/video signal to conduct commerce over the Internet. Broadcast information is broadcast from a remote location on a secondary network containing video over the secondary network to a location thereon proximate the location of the user PC. Unique information is encoded in the broadcast information representative of a location on the primary network of the remote node. The broadcast information is received and displayed on a video display at the location on the secondary network proximate the user PC. The user PC is connected to the remote node utilizing the unique information, and in accordance thereto, in response to receiving the unique information encoded within the broadcast information broadcast over the secondary network. The user is prompted to interface with the user PC by displaying a video image on the video display at approximately the same time as broadcast of the unique information over the secondary network in association with the broadcast information. | 2009-05-14 |
20090125957 | STATEFUL DHCPv6 RELAY AGENT IN A CABLE MODEM TERMINATION SYSTEM - A CMTS or other data aggregation component having a DHCPv6 relay agent extracts a Media Access Control (MAC) address of an end device from a data packet received from an end device. A DHCPv6 data frame is created for transmission to a DHCPv6 server. The MAC address may be inserted into a specific option of the DHCPv6 data frame, where data in the option may not be processed by the server and are echoed back to the aggregation component or CMTS. The DHCPv6 data frame is transmitted to the DHCPv6 server. The component receives a response message from the server that may contain the MAC address or similar client hardware address as it was sent to the server by the network component. The network component may determine an outgoing port interface from which the response message should be sent, utilizing the MAC address and an interface bundling table. In this manner, interface bundling may be enabled. | 2009-05-14 |
20090125958 | METHOD OF UPGRADING A PLATFORM IN A SUBSCRIBER GATEWAY DEVICE - A method of upgrading a platform in a subscriber gateway device involves remote management. The platform includes an operating system, a management agent, and a management information object. The management agent responds to remote management requests received by the subscriber gateway device. The management information object indicates a service interruption impact assessment of a subscriber gateway device as determined by a current status of the subscriber gateway device. According to the method, a request is sent to the management agent, and in response to the request, a value of the management information object is returned. Based upon the response, it is determined whether or not to initiate a platform upgrade for the subscriber gateway device. | 2009-05-14 |
20090125959 | METHOD AND APPARATUS OF CABLE MODEM INITIALIZATION USING QUEUE-DEPTH-BASED BAND REQUEST FRAME IN HFC NETWORKS - A cable modem initialization method and apparatus using a queue-depth-based band request frame in a Hybrid Fiber Coax (HFC) network relates to a method and apparatus of requesting a Cable Modem Transmission System (CMTS) for band allocation so that a cable modem supporting a plurality of transceiving channels may transmit upstream data in an HFC network. A method of transmitting the queue-depth-based band request frame that requests the band allocation by a byte length of a transmission buffer when the cable modem performs an initialization process is provided. | 2009-05-14 |
20090125960 | Dual Tuner Design Utilizing Only One Input Port On A Handheld Meter - A portable network test meter device for a CATV network is disclosed which permits simultaneous operation of a measurement system including a first tuner and a communication system including a cable modem including a second tuner. Only a single RF input/output port is necessary for connection to the CATV network. | 2009-05-14 |
20090125961 | Method of combining linear content and interactive content compressed together as streaming interactive video - A method comprising combining Internet linear video together with interactive video content into a single video stream that is compressed and transmitted in the form of streaming interactive video through the Internet to a user client device. | 2009-05-14 |
20090125962 | AUTOMATIC DIGITAL CONTENT MIGRATION SYSTEM FOR THEATERS - A method for transmitting digital content for a movie theater, the method includes the steps of receiving a schedule of the digital content; determining transmission prioritization requirements for transmission of the digital content according to one or more of either content size, schedule showtime, or network characteristics; and transmitting the digital content to one or more digital content players based on the determined prioritization. | 2009-05-14 |
20090125963 | System for establishing a connection between a service centre and a plurality of devices for the reception of television signal - A system for establishing a connection between a service center and a plurality of devices for reception of a television signal, wherein the connection utilizes an electric supply network. The electric supply network is set up as a local area network (LAN) of devices for the reception of the television signal. | 2009-05-14 |
20090125964 | DEVICE, METHOD AND SYSTEM OF SWITCHING BETWEEN FREQUENCY CHANNELS IN WIRELESS COMMUNICATION - Some demonstrative embodiments include devices, systems and/or methods of wireless communication. A method of switching between frequency channels of communication between wireless video communication modules may include, for example, transmitting over a first frequency channel at least one wireless video frame from a first wireless video communication module to a second wireless video communication module, wherein the video frame includes an indication of a second frequency channel to be used for communication between the first and second modules and an indication of a time at which the first and second modules are to switch to the second transmission channel. Other embodiments are described and claimed. | 2009-05-14 |
20090125965 | Method for updating resident software in different appliances and appliances adapted to be updated by same - The invention concerns a method enabling different software versions addressed to different decoders to be mixed in a common stream. The principle consists in defining a unique data format enabling a decoder to be updated from a stream transporting the binary segments of several software versions of the resident software, said binary segments consisting of segments common to several software versions of the resident software, said binary segments consisting of segments common to several software versions and segments specific to each of the software versions. | 2009-05-14 |
20090125966 | DIGITAL CABLE BROADCASTING RECEIVER INCLUDING SECURITY MODULE AND METHOD FOR AUTHENTICATING THE SAME - A digital cable broadcasting receiver and a method of authenticating the digital cable broadcasting receiver, the digital cable broadcasting receiver includes: a security module unit to perform a device authentication process using two-way communication with a Head End (HE) system, and to transmit authentication verification information generated by the device authentication process to a receiver central processing unit (CPU); a demodulation unit to demodulate a broadcasting signal received from a tuner based on the authentication verification information, and to extract transport stream data; the receiver CPU to control power of the demodulation unit based on the authentication verification information; and a decoding unit to restore the transport stream data into image data. | 2009-05-14 |
20090125967 | Streaming interactive video integrated with recorded video segments - A method comprising executing a program on a server of a server center that generates and streams a user page in the form of streaming interactive video on a display of a user computer connected to the server via the Internet, the user page including a plurality of video windows, one or more of the video windows including streaming interactive video as well as simultaneously recorded video segments which are replayable by the user. | 2009-05-14 |
20090125968 | System for combining recorded application state with application streaming interactive video output - An apparatus for recording application state information over time while simultaneous recording application streaming interactive video output. A playback means in which the recorded application video may be played back or the application may be re-executed with the application state information. | 2009-05-14 |
20090125969 | COMMUNICATION SIGNAL STRENGTH DISPLAY FOR TV INTERNET ADAPTER - A wireless signal strength indication is displayed on a TV, representing the signal strength of a wireless link between the Internet and an Internet adapter module providing Internet video to the TV. | 2009-05-14 |
20090125970 | Satellite LNB Power Supply Adaptive Load - A method of processing an LNB power supply output signal comprising providing an LNB selection signal to select a first of the plurality of LNB signals as the input signal, superimposing a tone onto the LNB selection signal to select a second of the plurality of LNB signals as the input signal, providing a first transponder selection voltage to select a first set of transponders within the input signal, providing a second transponder selection voltage to select a second set of transponders within the input signal, and activating an adaptive load to preserve the tone if the second of the plurality of LNB signals is selected. | 2009-05-14 |
20090125971 | Systems and Method of Controlling Access to Media Content - A system and method of controlling access to media content are disclosed. In one embodiment, the method includes receiving a viewing request at a set-top box device at a user premises. The method also includes retrieving a permission policy stored at the set-top box device and identifying a wireless device associated with the permission policy. Further, the method includes fulfilling the viewing request when the wireless device is present at the user premises and is within a first relative proximity to the set-top box device, and not fulfilling the viewing request when the wireless device is present at the user premises and is within a second relative proximity to the set-top box device. | 2009-05-14 |
20090125972 | FEDERATED SINGLE SIGN-ON (F-SSO) REQUEST PROCESSING USING A TRUST CHAIN HAVING A CUSTOM MODULE - Federated single sign on (F-SSO) uses a token service that fulfills requests by executing a module chain comprising a set of modules. F-SSO runtime processing is enhanced by enabling a federated entity user to define a custom module to include in the chain. The custom module includes one or more name-value pairs, wherein a given name-value pair has a value that may be validated against an entity-defined rule. The rule is determined during the processing of the custom module based on one or more invocation parameters of the module chain. In a runtime operation, F-SSO begins in response to receipt of a token. In response, the processing of the module chain that includes the custom module is initiated. During processing of the custom module, an attempt is made to validate the value of a name-value pair based on the rule. If the value of the name-value pair based on the rule can be validated, processing of the module chain continues. This approach enables finer granularity on the information that can be asserted or required as part of an F-SSO flow. | 2009-05-14 |
20090125973 | METHOD FOR ANALYZING AND MANAGING UNSTRUCTURED DATA - A system and method for managing unstructured data that includes identifying at least one unstructured data environment with unstructured data, identifying mitigating controls in each of the unstructured data environments, the mitigating controls reducing a security risk associated with each of the unstructured data environments, and generating at least one process for managing the unstructured data in each of the unstructured data environments, the process including defining mitigating controls for managing the unstructured data in each of the unstructured data environments. | 2009-05-14 |
20090125974 | Method and system for enforcing trusted computing policies in a hypervisor security module architecture - A method and system for enforcing trusted computing (TC) policies in a security module architecture for a hypervisor. Upon receiving a request from a subject for access to an object, TC-related attribute values are obtained for the subject and the object based on a virtualized trusted platform module (vTPM). Access control decisions are the made based at least on the TC-related attribute values and TC-related policies. | 2009-05-14 |
20090125975 | Method for generating a plurality of unique secure numbers and card comprising such a number - A process is provided for enabling the generation of valid secure numbers during a given period, these secure numbers having an optimal security level, while preserving the possibility for creating additional numbers or increasing the security level in accordance with the requirements. In at least one embodiment, the method permits the generation of as many secure numbers as are required, while having a maximum security level, which reduces the risks of sending a random number allowing the assignment of entitlements or a credit. The contradictory parameters for the quantity of generated numbers and security can be corrected at any time. | 2009-05-14 |
20090125976 | AUTOMATED TEST INPUT GENERATION FOR WEB APPLICATIONS - A method and apparatus is disclosed herein for automated test input generation for web applications. In one embodiment, the method comprises performing a source-to-source transformation of the program; performing interpretation on the program based on a set of test input values; symbolically executing the program; recording a symbolic constraint for each of one or more conditional expressions encountered during execution of the program, including analyzing a string operation in the program to identify one or more possible execution paths, and generating symbolic inputs representing values of variables in each of the conditional expressions as a numeric expression and a string constraint including generating constraints on string values by modeling string operations using finite state transducers (FSTs) and supplying values from the program's execution in place of intractable sub-expressions; and generating new inputs to drive the program during a subsequent iteration based on results of solving the recorded string constraints. | 2009-05-14 |
20090125977 | LANGUAGE FRAMEWORK AND INFRASTRUCTURE FOR SAFE AND COMPOSABLE APPLICATIONS - A method and apparatus is disclosed herein for using a language framework for composable programs. In one embodiment, the method comprises accessing active content having a software component embedded therein, where the software component has a plurality of components that together implement a work flow of a sequence of activities, the plurality of components representing one or more external services, one or more user interface controls and one or more inputs and output; executing the software component, including mediating communication between components using an information flow-based security model. | 2009-05-14 |
20090125978 | APPARATUS AND METHOD FOR MANAGING CONTENTS RIGHT OBJECT IN MOBILE COMMUNICATION TERMINAL - An apparatus and method for managing a contents right object in a mobile communication terminal are provided. In the method, when a system update event occurs, a valid right object of contents in the mobile communication terminal is encoded and the encoded right object is transmitted to a server. A system update is executed and then the server is requested to transmit the encoded right object. The encoded right object is received from the server and the received right object is decoded. | 2009-05-14 |
20090125979 | COMMUNICATION SYSTEM, AUTHENTICATION METHOD, INFORMATION PROCESSING DEVICE, INFORMATION PROCESSING METHOD, AND BATTERY - An authenticating system according to the present invention has a characteristic structure of which an authenticating section | 2009-05-14 |
20090125980 | NETWORK RATING - Methods and systems for operation upon one or more data processors for assigning a reputation to a messaging entity by analyzing the attributes of the entity, correlating the attributes with known attributes to define relationships between entities sharing attributes, and attributing a portion of the reputation of one related entity to the reputation of the other related entity. | 2009-05-14 |
20090125981 | SYSTEM AND METHOD FOR WIRELESS NETWORK AND PHYSICAL SYSTEM INTEGRATION - In one embodiment, an apparatus includes an intrusion detection arrangement and a location identification arrangement. The intrusion detection arrangement determines when a client without authorization attempts to access a wireless network of which the intrusion detection arrangement is a part. The location identification arrangement identifies at least a first approximate physical location of the client without authorization when the client without authorization attempts to access the wireless network. The location identification arrangement is configured to communicate the first approximate physical location to a surveillance arrangement which monitors the first approximate physical location | 2009-05-14 |
20090125982 | COMPUTER SYSTEM FOR PORT FORWARDING - A computer system includes multiple computer modules each including at least a calculator and a storing unit. A first computer module of the computer modules includes: a storing unit that stores authentication information for connection with a second computer module of the computer modules; an authenticator that authenticates an information processing device accessing the first computer module, and allows the information processing device to access thereto based on an authentication result; and a relay connector that connects the information processing device allowed to access the first computer module to the second computer module based on the authentication information. | 2009-05-14 |
20090125983 | Security key with instructions - There is described an automation system comprising at least one programmable logic controller with integrated web server, user interface means, and security means. It is configured to allow a complex and flexible presentation of data at the user interface means while reducing the communication load at the same time. For this purpose, the instructions for presentation of the data are stored within the security means. | 2009-05-14 |
20090125984 | SYSTEM AND METHOD FOR ESTABLISHING DATA CONNECTIONS BETWEEN ELECTRONIC DEVICES - A system and method is disclosed, including establishing of data connections between electronic devices. One embodiment provides a method for establishing a data connection between a first and a second electronic device, wherein establishing the data connection is authorized by executing at least one action with at least one physical tool. | 2009-05-14 |
20090125985 | Verifying electronic control unit code - A method and apparatus are provided for verifying authenticity of program code for an electronic control unit. In one implementation, a method is provided. According to the method, program code for an the electronic control unit is received. The method may access metadata embedded in the program code. The metadata may identify a source of the program code. The method may further communicate via a network with a server to determine a status of the program code. The method may verify the authenticity of the program code based on the source of the program code and the status. | 2009-05-14 |
20090125986 | Secure launching of browser from privileged process - Methods and apparatus include securely launching a web browser from a privileged process of a workstation to minimize enterprise vulnerabilities. The workstation includes a web browser pointed toward a web server and a Logon API for use with a password/credential. An executable file is wrapped about the browser and imposes restrictions, such as preventing the writing to a registry or installing ActiveX controls. It also has functionality to prevent users from linking to web locations in other than an https protocol or following links beyond an original host. Upon indication of a forgotten password/credential, a DLL logs onto a user account which invokes the executable file to launch the web browser in the https protocol. Upon authentication of identity, the user changes their password/credential for later logging-on to the workstation via the Logon API, but in a capacity without the limited functionality or the imposed browser restrictions. | 2009-05-14 |
20090125987 | DIGITAL RIGHTS MANAGEMENT - A method for distributing rights objects between a first device | 2009-05-14 |
20090125988 | SECURE TRANSMISSION OF DIGITAL CONTENT BETWEEN A HOST AND A PERIPHERAL BY WAY OF A DIGITAL RIGHTS MANAGEMENT (DRM) SYSTEM - A host securely transmits content to a peripheral thereof. The peripheral has a symmetric key (PK) and a copy of (PK) encrypted according to a public key (PU) of an entity ((PU(PK))). In the method, the host receives (PU(PK)) from the peripheral, and sends (PU(PK)) to the entity. The entity has a private key (PR) corresponding to (PU), applies (PR) to (PU(PK)) to obtain (PK), and sends (PK) back to the host. The host receives (PK) from the entity, encrypts at least a portion of the content according to (PK), and transmits the encrypted content to the peripheral. The peripheral may then decrypt the encrypted content based on (PK). A bind key (BK) encrypted by (PK) ((PK(BK))) may accompany (PU(PK)), where the content is to be encrypted according to (BK). Thus, (PK) is not revealed to the host. | 2009-05-14 |
20090125989 | EXTENSION POINT APPLICATION AND CONFIGURATION OF A LOGIN MODULE - Embodiments of the present invention address deficiencies of the art in respect to applying application security to an extension point oriented application framework, and provide a novel and non-obvious method, system and computer program product for log-in module deployment and configuration in an extension point oriented application. In this regard, a method for log-in module deployment and configuration in an extension point oriented application can include installing a proxy to a login controller plug-in for the extension point oriented application, and proxying login module directives from an external security service to the login controller plug-in for the extension point oriented application. | 2009-05-14 |
20090125990 | WIRELESS E MAIL CONNECTIVITY - A method, system and software enable e-mails to be sent from a mobile wireless device on which an email client application is installed while roaming on any wireless IP network, without limitation due to the home ISP restrictions. This involves the steps of: automatically or manually configuring the roaming user's email client to deliver email locally on the mobile device; so intercepting emails sent by the e-mail client; determining if the currently connected network is on a predefined list; avoiding outgoing email server flooding; routing of the email through a dedicated secure SMTP server with SMTP authentication and encryption; and associating wireless network log-in credentials with SMTP authentication credentials in a secure and hidden manner. | 2009-05-14 |
20090125991 | SECURE MANAGEMENT OF AUTHENTICATION INFORMATION - A system, method and computer program product are provided for managing authentication information for a user. According to the method, a master digital key is received from the user, and authentication of the user is obtained based on the master digital key. There is received from the user a selection of one identity from among a plurality of identities that are stored for the user. Authentication information for the user is provided into an application or web page based on the one identity selected by the user. In one embodiment, the authentication information is provided by recognizing a web page for which authentication information is stored, and automatically filling the authentication information for the user into appropriate elements of the web page. | 2009-05-14 |
20090125992 | SYSTEM AND METHOD FOR ESTABLISHING SECURITY CREDENTIALS USING SMS - The present invention provides a system and method for establishing security credentials for using an Internet or other network application requiring user authentication. In an exemplary embodiment, a user electronic device may connect to an application server to initiate use of the application. The application server may respond by transmitting to the user electronic device session identification information (a Session ID). The user electronic device may then transmit an SMS message containing the Session ID back to the application server, which permits the application server to link to the user electronic device. The application server may generate for the user encrypted security credentials and transmit an encryption key for them to the user electronic device in a response SMS message. In a separate message, the security credentials are transmitted to the user. In this manner, only the legitimate user electronic device has both the encryption key and the encrypted security credentials. The user electronic device may then decrypt the security credentials using the encryption key, and use the security credentials to access the network application. | 2009-05-14 |
20090125993 | METHOD FOR PROTECTING AGAINST KEYLOGGING OF USER INFORMATION VIA AN ALTERNATIVE INPUT DEVICE - A method for protecting against keylogging, the method includes: detecting from a host browser application, a request for a password input by a user of an alphanumeric input device in an entry field of a transaction; inserting a temporary indicator password in the entry field; sending an identifier of the host application with the temporary indicator password to an alternative device; retrieving a user assigned password stored in a table in the alternative device in response to matching the identifier of the host application and the temporary indicator password; sending the user assigned password to the host application; inserting the user assigned password in place of the temporary indicator password in the entry field; and sending the transaction to a server for verification and further processing. | 2009-05-14 |
20090125994 | Communication between a human user and a computer resistant to automated eavesdropping - Communication between a human user and a computer over an insecure channel is accomplished by encoding user input using one or more character substitution tables. The character substitution tables are transmitted to the user over the insecure channel in a perceptually modified form which renders them difficult for use by automated adversaries but keeps them easily understandable by humans. | 2009-05-14 |
20090125995 | Method and System For Accounting Access by Users to Data Networks, Related Computer Program Product - A system for the time-based accounting of access by users to services provided by a data network includes a primary access node to provide access by users by establishing via the primary access node a steady connectivity between the users and the network. A secondary access node is associated with the primary access node, such secondary access node being configured for acting as a backup node to maintain connectivity in the case of failure involving the primary access node. The primary access node is configured for issuing a request for credentials for any user requesting access to said data network and, as a result of receiving valid credentials from the user, starts time-based accounting for the user. An authentication node cooperative with the primary access node and the secondary access node stores the secondary access node information items concerning the time-based accounting started for the user. The time-based accounting is thus maintained in the case of failure involving the primary access node as connectivity is maintained by the secondary access node. | 2009-05-14 |
20090125996 | VIRTUAL SUBSCRIBER IDENTITY MODULE - A mobile trusted platform (MTP) configured to provide virtual subscriber identify module (vSIM) services is disclosed. In one embodiment, the MTP includes: a device manufacturer-trusted subsystem (TSS-DM) configured to store and provide credentials related to a manufacturer of the MTP; a mobile network operator-trusted subsystem (MNO-TSS) configured to store and provide credentials related to a mobile network operator (MNO); and a device user/owner-trusted subsystem (TSS-DO/TSS-U) configured to store and provide credentials related to user of the MTP. The TSS-MNO includes a vSIM core services unit, configured to store, provide and process credential information relating to the MNO. The TSS-DO/TSS-U includes a vSIM management unit, configured to store, provide and process credential information relating to the user/owner of the MTP. The TSS-DO/TSS-U and the TSS-MNO communicate through a trusted vSIM service. | 2009-05-14 |
20090125997 | Network node with one-time-password generator functionality - Structures and methods are disclosed for facilitating secure connectivity of a remote client to an enterprise network using OTP-enabled nodes of a remote access platform. Embodiments described herein include an OTP device associated with a client device (for example and without limitation, an OTP device residing within a PC card associated with a laptop or desktop computer) defining a first node of a remote access platform; and an OTP server defining a second node of a remote access platform that generates and maintains the same OTP as the OTP device at the first node, for purposes of authenticating the client device and/or user of the client device. | 2009-05-14 |
20090125998 | SYSTEMS, METHODS AND DEVICES FOR SECURE REMOTE-ACCESS COMPUTING - Previous attempts to provide systems or methods for remote-access computing typically involve the use of subscription-based third party platforms. The third party platforms serve as an intermediary between a home (or primary) computer and a local-host computer. There are a number of problems associated with these third party platforms that generally affect the security of information and possible performance expectations of users. By contrast, provided by aspects of the present invention there are systems, methods and devices for secure remote-access computing that enable more secure remote-access computing and may enhance predictability of performance from the perspective of the user. | 2009-05-14 |
20090125999 | User Authorization Technique - Described are a system and method for invisible authorization of a visitor to a web site. A system uses a specially formed URL that provides visitors access to secure content without requiring a sign-in and/or sign-up step, yet, if the URL is forwarded to others the content is not accessible. The URL can be delivered in an electronic message. | 2009-05-14 |
20090126000 | SINGLE SIGN-ON METHOD FOR WEB-BASED APPLICATIONS - A method for single-sign on of a user on a client machine to one or more target applications on target application servers in a computer information-processing network, including: accessing an access server from the client machine; entering user-specific access server logon credentials for logon and access to the access server; selecting a target application; presenting to the target application by the access server, previously stored user-specific target application logon credentials for logon and access to the target application in a form and according to a protocol recognizable by the target application thereby logging into the target application on behalf of the user and establishing a target application session; sending from the access server to the client machine, information for establishing a connection from the client machine to the target application; and establishing a target application session, bypassing the access server, between the client machine and the target application. | 2009-05-14 |
20090126001 | TECHNIQUES TO MANAGE SECURITY CERTIFICATES - Techniques to manage security certificates are described. An apparatus may comprise a certificate proxy server having a transceiver and a certificate manager module. The certificate manager module may be operative to register a digital identity certificate for a call terminal to perform authentication operations on behalf of the call terminal, and manage the digital identity certificate for the call terminal. Other embodiments are described and claimed. | 2009-05-14 |
20090126002 | SYSTEM AND METHOD FOR SAFEGUARDING AND PROCESSING CONFIDENTIAL INFORMATION - One aspect of the invention is a method for providing restricted access to confidential services without impacting the security of a network. The method includes using a gateway to isolate one or more components providing confidential services from one or more other portions of an enterprise network. A first communication directed to a selected one of the one or more components may be received at the gateway. A determination may be made as to whether the first communication is user traffic or management traffic. The first communication may then be authenticated. If the first communication is user traffic, the first communication is forwarded to a component providing the confidential services. If the first communication is management traffic, the first communication is encrypted and forwarded to a component providing the confidential services. Additionally, components of the sub-network may be monitored to identify malicious changes. | 2009-05-14 |
20090126003 | System And Method For Providing Network And Computer Firewall Protection With Dynamic Address Isolation To A Device - A computer performs dynamic address isolation. The computer comprises an application associated with an application address, a network interface coupled to receive incoming data packets from and transmit outgoing data packets to an external network, a network address translation engine configured to translate between the application address and a public address, and a driver for automatically forwarding the outgoing data packets to the network address translation engine to translate the application address to the public address, and for automatically forwarding the incoming data packets to the network address translation engine to translate the public address to the application address. The computer may communicate with a firewall configured to handle both network-level security and application-level security. | 2009-05-14 |
20090126004 | PACKET TRANSFER DEVICE, PACKET TRANSFER METHOD, AND PROGRAM - A packet transfer apparatus is provided with: storage means configured to store a predetermined search pattern and an address identifying a predetermined apparatus; determination means configured to determine whether predetermined data in a packet received from a network interface matches the search pattern; determination means configured to determine a network interface for outputting the packet using the determination result; replacement means configured to replace an address identifying a destination apparatus of the packet with an address identifying the predetermined apparatus when outputting the packet from a network interface connected to the predetermined apparatus; and packet sending means configured to send the packet to the determined network interface. | 2009-05-14 |
20090126005 | METHOD, APPARATUS AND SYSTEM FOR MANAGING MALICIOUS-CODE SPREADING SITES USING FIREWALL - A method for managing a website is provided in which a web page including a malicious code is classified to be registered in a network firewall, so that a network terminal is prevented from being accessed to the web page including a malicious code. | 2009-05-14 |
20090126006 | SECURING CPU AFFINITY IN MULTIPROCESSOR ARCHITECTURES - In an embodiment of the present invention, the ability for a user or process to set or modify affinities is restricted in order to method for control a multi-processor environment. This may be accomplished by using a reference monitor that controls a process' capability to retrieve and set its or another process' affinity. This aids in the prevention of security breaches. | 2009-05-14 |
20090126007 | IDENTITY MANAGEMENT SUITE - A server platform hosting an integrated software-based identity management suite used in a system for authenticating users with respect to a legacy application. The identity management suite includes an administration console for domain administration, an authentication services module for user authentication, an activity intelligence engine for monitoring user activity, an open-source-based virtual layer for mapping fields of a legacy user directory to fields within the server platform, and an internal interface using an open communication protocol adapted to provide communication between the open-source-based virtual layer and at least the authentication services module within the server platform. | 2009-05-14 |
20090126008 | ADAPTIVE CAPACITY POWER SUPPLY - Methods and systems are disclosed for automatically tracking and controlling the capacity ratings of UPS units. The methods and systems provide a central server or repository for storing the capacity ratings, grant kVA and grant code authorized for each UPS unit along with a unique security key for each unit. When a customer purchases a capacity upgrade, the server updates the capacity rating for the customer's unit and issues an upgrade grant that includes the new rating and the grant code. The upgrade grant may thereafter be downloaded by a service technician and used to upgrade the unit. Alternatively, the upgrade grant may be downloaded directly to the UPS unit, and the unit's software and/or firmware may perform the upgrade automatically. In either case, the upgrade may be performed through a software modification, thus eliminating the need for the technician to physically swap out hardware. Such an arrangement helps ensure that only authorized capacity upgrades are performed. | 2009-05-14 |
20090126009 | PORTABLE COMPUTING SYSTEM, APPARATUS AND METHOD - A computing system comprising a pocket personal computer and a reader are disclosed. The pocket PC is credit card-sized and comprises flash memory, and optionally a processor and a GPS chip. In some embodiments, the pocket PC also includes an operating system. The reader includes a monitor, a keyboard with docking port and an optional processor and at least one input/output USB connector. A user cannot interact with the pocket PC without the reader. The reader is a non-functioning “shell” without the pocket PC, however, when they are connected the system becomes a fully functional personal computer. To log on, a user provides security information, for example, a password or biometrics, such as fingerprints. The credit card size and capabilities of the pocket PC allows a user to easily carry virtually their entire computer in a pocket for use anywhere there is a reader. In addition, the pocket PC provides security against unauthorized use, even if lost or stolen, since a password or fingerprints are required to access to the device. | 2009-05-14 |
20090126010 | USING OBJECT BASED SECURITY FOR CONTROLLING OBJECT SPECIFIC ACTIONS ON A SURFACE BASED COMPUTING DEVICE - The present invention discloses a solution for object level security on a surface based computing device that includes software objects and behavior tokens. The behavior tokens can control an extent that users are able to manipulate the software objects using the surface based computing device. Different levels of control can be established on an object-by-object basis for different users. The extent users are able to manipulate the software objects can also depends upon set of users proximate to the surface based computing device. | 2009-05-14 |
20090126011 | APPLICATION SECURITY MODEL - Performing security sensitive operations with an application security model. Security agnostic code is executed. The security agnostic code is identified as not having authorization to perform a security sensitive operation. Executing the security agnostic code includes calling code identified as security safe critical code. In response to the security agnostic code calling the security safe critical code, the security safe critical code is executed. The security safe critical code includes functionality for performing validity checks. Executing the security safe critical code includes performing an validity check for the security agnostic code. When the security agnostic code passes the validity check, code identified as security critical code is called. In response to the security safe critical code calling the security critical code, the security critical code is executed. The security critical code is authorized to perform the security sensitive operation. | 2009-05-14 |
20090126012 | Risk Scoring System For The Prevention of Malware - A method suitable for detecting malicious files includes several steps. A file that is received into a computer system is analyzed to determine a presence or absence of each of a plurality of predefined properties in the file. A score is calculated based on the presence or absence of the plurality of properties in the file. This score is reflective of the risk that the file is malicious. Once the score is calculated, the file can be further processed based on the score. | 2009-05-14 |
20090126013 | SYSTEMS AND METHODS FOR DETECTING CHILD IDENTITY THEFT - Embodiments of the present invention provide systems and methods for detecting an indication of a suspicious event associated with personal information of a child. Personal information representing a social security number of the child and a name of the child is received. Parent personal information representing contact information for a parent of the child is received. A child file for the child is created and stored on a computer-readable medium. The child file for the child includes the personal information representing the social security number of the child and the name of the child. The child file for the child is locked by associating an electronic notice to the child file for the child to prevent access to a database using at least part of the personal information of the child. The database includes credit data. The child file and the credit data is monitored for the indication of the suspicious event using the personal information representing the social security number of the child. A notification is transmitted to the parent using the parent personal information representing contact information for the parent. The notification is transmitted after detecting the indication of the suspicious event. The notification includes information associated with the indication of the suspicious event. | 2009-05-14 |
20090126014 | METHODS AND SYSTEMS FOR ANALYZING SECURITY EVENTS - In one aspect, the technology relates to a method for analyzing a security event in a distributed fashion. The method includes the steps of detecting an occurrence of a security event within a customer network and querying a first component of the customer network for data in response to the detected occurrence of the security event. The method also includes the steps of receiving, by a data monitor located within the customer network, first data from the component in response to the query and determining, based on the received first data, whether to query for additional data. The method additionally includes querying at least one of the first component and another component of the customer network to obtain the additional data in response to the determining step, and analyzing the security event using at least one of the first data and the additional data. | 2009-05-14 |
20090126015 | SYSTEM AND METHOD FOR DETECTING MULTI-COMPONENT MALWARE - Malicious behavior of a computer program is detected using an emulation engine, an event detector and an event analyzer. The emulation engine includes a system emulator configured to emulate, in an isolated computer environment, at least a part of a computer system and a program emulator configured to emulate in the isolated computer environment execution of the computer program, including execution of a plurality of executable components of the computer program, such as execution processes and threads. The event detector is configured to monitor events being generated by two or more of the executable components. The event analyzer is configured to determine, substantially in real time, based at least on one or more events generated by each of two or more of the plurality of executable components whether or not the computer program exhibits malicious behavior, wherein individually one or more of the plurality of executable components may exhibit benign behavior. | 2009-05-14 |
20090126016 | SYSTEM AND METHOD FOR DETECTING MULTI-COMPONENT MALWARE - Malicious behavior of a computer program is detected using an emulation engine, an event detector and an event analyzer. The emulation engine includes a system emulator configured to emulate, in an isolated computer environment, at least a part of a computer system and a program emulator configured to emulate in the isolated computer environment execution of the computer program, including execution of a plurality of executable components of the computer program, such as execution processes and threads. The event detector is configured to monitor events being generated by two or more of the executable components. The event analyzer is configured to determine, substantially in real time, based at least on one or more events generated by each of two or more of the plurality of executable components whether or not the computer program exhibits malicious behavior, wherein individually one or more of the plurality of executable components may exhibit benign behavior. | 2009-05-14 |
20090126017 | Methods and systems for preventing security breaches - A security payload is attached to a received binary executable file. The security payload is adapted to intercept application programming interface (API) calls to system resources from the binary executable file via export address redirection back to the security payload. Upon execution of the binary executable file, the security payload replaces system library export addresses within a process address space for the binary executable file with security monitoring stub addresses to the security payload. Upon the binary executable computer file issuing a call to a given API, the process address space directs the call to the given API back to the security payload via one of the security monitoring stub addresses that is associated with the given API. The security payload then can assess whether the call to the given API is a security breach. | 2009-05-14 |
20090126018 | PASSWORD EXPIRATION BASED ON VULNERABILITY DETECTION - Illustrative embodiments provide a computer implemented method, a data processing system and a computer program product for password expiration based on vulnerability detection. The computer implemented method comprises receiving a request for a password after re-activating a user account and requesting a password generator, to create a hashed password. The method further comprises comparing the hashed password to a previously created password of a user, to determine a match entry. Responsive to determining a match entry, expiring an account of the user with respect to the match entry. | 2009-05-14 |
20090126019 | NETWORK-BASED INFECTION DETECTION USING HOST SLOWDOWN - Host malware (or change) may be detected by (1) receiving baseline set of response time information for each of one or more transactions involving (A) the host and (B) at least one peer of the host, (2) determining or receiving a later set of response time information for each of the one or more transactions involving the host and the at least one peer of the host, and (3) determining whether or not host slowdown has occurred using the baseline set of response time information and the later set of response time information. The execution of a host malware (or change) protection policy may be controlled using at least the determination of whether or not host slowdown has occurred. | 2009-05-14 |
20090126020 | ENGINE FOR RULE BASED CONTENT FILTERING - An engine for editing contents of data containers has a set of processors which hosts a set of controllers, each controller coupled to a respective set of transcoders. A memory device stores an array of Boolean variables characterizing the contents of a container, and an array of encoded rules for determining needed content editing, if any. The Boolean variables are determined according to content descriptors and respective criteria. A graphical user interface enables a user to provide the descriptors, the criteria, and the encoded rules. Each transcoder applies the encoded rules to specific containers. A transcoder also performs container adaptation functions which may modify contents of a container to be compatible with a respective receiver. The engine receives containers from clients through a network and directs each container to a respective controller. | 2009-05-14 |
20090126021 | SECURE INITIALIZATION OF INTRUSION DETECTION SYSTEM - Secure initialization for detecting intrusions is disclosed. The secure initialization includes storing a behavior profile associated with an application, and reading the stored behavior profile that is cryptographically protected. The method further includes monitoring execution of the application during a bootstrapping phase of an intrusion detection system, according to the stored behavior profile. If the behavior of the application does not conform to the behavior profile, a message is issued indicating that the application is not conforming to the behavior profile. The behavior profile can be generated by a developer of the intrusion detection system, a developer of the application, and/or a third party developer. Additionally, the behavior profile is generated by executing the system on a reference computer system or by heuristic determination. | 2009-05-14 |
20090126022 | Method and System for Generating Data for Security Assessment - A system for creating data to be inputted to a security assessment system is provided with: a system configuration information collection unit for collecting system configuration information from an assessment object system; an attribute information input unit for receiving attribute information added to the system configuration information; an access policy generation unit for generating an access policy using the attribute information; and an assessment policy generation unit for generating an assessment policy representing an improper data migration path based on the access policy, the system configuration information and the attribute information. | 2009-05-14 |
20090126023 | APPARATUS AND METHOD FOR FORECASTING SECURITY THREAT LEVEL OF NETWORK - Provided are an apparatus and method for forecasting the security threat level of a network. The apparatus includes: a security data collection unit for collecting traffic data and intrusion detection data transmitted from an external network to a managed network; a malicious code data collection unit for collecting malicious code data transmitted from a security enterprise network; a time series data transformation unit for transforming the data collected by the security data collection unit into time series data; a network traffic analysis unit for analyzing traffic distribution of the managed network using the data collected by the security data collection unit; and a security forecast engine for forecasting security data of the managed network using the time series data obtained by the time data transformation unit, the data analyzed by the network traffic analysis unit, and the data collected by the malicious code data collection unit. | 2009-05-14 |
20090126024 | METHOD AND SYSTEM FOR MANAGING SOFTWARE LICENSES AND STORAGE APPARATUS - The management of software licenses becomes easy without incurring an increase in costs to effectively prevent software applications from unauthorized use. The software license managing method including: judging, when a software program installed in a computer is executed, whether or not a memory card having a predetermined ID is connected to said computer by an ID extracting and verifying program; permitting execution of said software program if the ID extracting and verifying program judges that said memory card is connected to said computer; inhibiting execution of said software program if the ID extracting and verifying program judges that said memory card is not connected to said computer. | 2009-05-14 |
20090126025 | System for protecting information - A system in accordance with the present invention protects information. The system includes a processor for processing information and a state machine utilizing tables for determining protection requirements for the information. | 2009-05-14 |
20090126026 | METHOD, APPARATUS AND SYSTEM FOR MANAGING MALICIOUS-CODE SPREADING SITES USING SEARCH ENGINE - Provided is a method for enabling a user terminal to avoid exposure to a malicious code, by classifying web pages including a malicious code and blocking user access to the web pages including the malicious code when a user searches for a web page using a search engine. A method for managing malicious-code spreading sites using a search engine includes: analyzing a currently accessed web site to determine whether a malicious code is included in the web site; if the malicious code is included in the currently accessed web site, registering the web site as a malicious-code spreading site; and, if the web site registered as a malicious-code spreading site is included in a web-site search result from a search engine, blocking user access to the web site. Web pages including a malicious code are classified and user access to the web pages including the malicious code is blocked when a user searches for a web page using a search engine, thereby preventing a user terminal from being exposed to the malicious code. | 2009-05-14 |
20090126027 | FILE ACCESSING AND RETRIEVAL USING SOFT DIGITAL RIGHTS MANAGEMENT TECHNOLOGY - The subject matter disclosed herein relates to a method and/or system for enabling access to computer file content using an open routine having a proprietary argument. | 2009-05-14 |
20090126028 | Securing electronic control unit code - Methods and systems are provided for securing electronic control unit code. In one implementation, a method is provided. According to the method, an order for the program code may be transmitted to a developer. The order may include specifications and an authentication key. The method may further include receiving the program code and the authentication certification from the developer and verifying the authentication certificate to determine whether the developer was an authorized source of the program code. The method may generate metadata identifying the authorized source of the program code and embed the metadata in the program code. | 2009-05-14 |
20090126029 | Permanent Data Hardware Integrity - A method for processing digital data X of an item of software coded on l | 2009-05-14 |
20090126030 | Tamper detection line circuitry for use in authenticating an integrated circuit - Provided is tamper detection line circuitry for an authentication integrated circuit for use in authenticating an integrated circuit. The tamper detection line circuitry includes a source of pseudo-random bits, and an XOR gate with two inputs and an output in signal communication with flash memory erase and reset circuits. A complete erasure of the memory is triggered by a 0 from the XOR gate. The circuitry also includes first and second paths arranging the source and XOR gate in signal communication with each other, as well as a number of triggers connected to the respective paths, each trigger configured to detect a physical attack on the authentication integrated circuit, said triggers configured to pull a respective path to 0 if a physical attack is detected. | 2009-05-14 |
20090126031 | MICE LACKING ALPHA 1G SHOWING ENHANCED NOVELTY-SEEKING AND ALCOHOL PREFERENCE AND THERAPEUTIC METHODS FOR MOOD DISORDERS BY MODULATING ALPHA 1G T-TYPE CALCIUM CHANNELS - The present invention relates to a novel use of an α1G T-type calcium channel transgenic mouse as a nervous disease model, more particularly, a novel use of a mouse deficient in α1G T-type calcium channel showing novelty-seeking and alcohol preference as a nervous disease model for human nervous related diseases such as novelty-seeking character, alcoholism, anxiety and emotion disorder by stress, etc. The α1G T-type channel transgenic mice showing novelty-seeking and alcohol preference of the present invention can be effectively used for the development of a medicine and a therapeutic method for human nervous diseases. | 2009-05-14 |
20090126032 | Method to produce cloned embryos and adults from cultured cells - A nuclear transfer method is provided wherein nuclear DNA in whole or part is injected into enucleated oocytes. The method is suitable for different donor cells, and preferably ES cells. | 2009-05-14 |
20090126033 | Method of selective breeding based on ob genotype - A method for improving efficiencies in livestock production comprises grouping livestock animals, such as cattle and pigs, during the period of their retention in a feeding facility according to the genetic predisposition of individual livestock animals to deposit fat, and then feeding the animals in each group substantially uniformly. Such genetic predisposition is determined by determining homozygosity or heterozygosity of each animal with respect to alleles of a gene encoding an adipocyte-specific polypeptide, termed leptin, which gene is hereinafter referred to as ob, segregating such animals into groups based on genotype and optionally phenotype, feeding and otherwise maintaining animals in a group together and apart from other groups of animals, and ceasing to feed the animals in the group at a time when the median body fat condition of the animals of that group is a desired body fat condition. Packers can also more accurately predict the fat deposition in carcasses of live animals it purchases, leading to increased efficiencies. | 2009-05-14 |
20090126034 | Environmentally Stable Sensors and Methods of Using the Same - Environmentally stable biosensors are disclosed, which comprise a ligand binding domain from a thermophilic organism conjugated to donor and fluorescent moieties that permit detection and measurement of Fluorescence Resonance Energy Transfer upon ligand binding. Such biosensors demonstrate enhanced acid-, thermal- and chemical stability as compared to sensors constructed using protein domains from mesophilic organisms. | 2009-05-14 |
20090126035 | Rice Hybrid XL729 - A rice hybrid designated XL729 is disclosed. The invention relates to the seeds of rice hybrid XL729, to the plants of rice hybrid XL729 and to methods for producing a rice plant produced by crossing the hybrid XL729 with itself or another rice plant. The invention further relates to hybrid rice seeds and plants produced by crossing the hybrid XL729 with another rice plant. This invention further relates to growing and producing blends of rice seeds comprised of seeds of rice hybrid XL729 with rice seed of one, two, three, four or more of another rice hybrid, rice variety or rice inbred. | 2009-05-14 |
20090126036 | Brassica Oleracea Plants with a Resistance to Mycosphaerella Brassicicola - On embodiment of the present invention discloses | 2009-05-14 |
20090126037 | TOMTATO PLANTS HAVING HIGHER LEVELS OF RESISTANCE TO BOTRYTIS - The present invention relates to a method for detecting a quantitative trait locus (QTL) associated with resistance to | 2009-05-14 |
20090126038 | Rna constructs - The present invention concerns concatemer and/or stabilized RNA constructs capable of forming dsRNA, optionally comprising a sequence capable of protecting the dsRNA against RNA processing in a host cell. The invention also relates to methods of producing these constructs and to methods for using these constructs. The constructs according to the present invention are particularly useful in plant pest control. | 2009-05-14 |
20090126039 | Plants Having Increased Yield And Method For Making The Same - The present invention concerns a method for increasing plant yield in plants grown under non-stress growth conditions relative to yield in corresponding wild type plants grown under comparable conditions, the method comprising preferentially increasing activity in the cytosol of a plant cell of a type I DnaJ-like polypeptide or a homologue thereof. One such method comprises introducing and/or expressing in a plant, plant part or plant cell a type I DnaJ-like nucleic acid or variant thereof. The invention also relates to transgenic plants grown under non-stress conditions having introduced and/or expressed therein a type I DnaJ-like nucleic acid or variant thereof, which plants have increased plant yield relative to corresponding wild type plants grown under comparable conditions. The present invention also concerns constructs useful in the methods of the invention. | 2009-05-14 |
20090126040 | Plant Vernalization Independence (VIP) Genes, Proteins, and Methods Of Use - The present invention relates to plant genes involved in regulating flowering, and especially to genes involved in the induction of flowering in response to cold, or vernalization. In particular, the present invention provides the identification, cloning, and characterization of genes involved in vernalization, and specifically of VIP genes, as well as to the proteins encoded by these genes, and to methods of using the VIP genes and proteins. Mutants of VIP genes, where the mutation is a knock-out mutation, confer a vernalization independence, or constitutively vernalized, phenotype in a plant which in the non-mutant form requires vernalization to flower. | 2009-05-14 |