23rd week of 2010 patent applcation highlights part 48 |
Patent application number | Title | Published |
20100146487 | APPARATUS AND METHOD FOR APPLICATION TESTING OF EMBEDDED SYSTEM - Provided is to an apparatus for application testing of an embedded system which can cross-develop an application program installed in the embedded system regardless of the type of a target system. A virtual environment for testing the application program adopted in the target system is constructed on the basis of information inputted through a user interface and the application program is tested by configuring a virtual target system in the constructed virtual environment. According to the present invention, the application program adopted in the target system can be developed and tested without constructing a cross-development environment for each target system in an environment in which various kinds of embedded systems are developed. | 2010-06-10 |
20100146488 | AUTOMATIC TEST TOOL FOR WEBPAGE DESIGN WITH MICRO-BROWSERS ON MOBILE PLATFORMS - Architecture that provides a convenient and effective test tool for testing and ensuring that webpages using micro-browsers are sufficiently designed and operational. A task library is developed for manipulating browsers on a handheld device, and includes one or more seamless methods that operate the different browsers in the same way. Seamless virtual functions that manipulate different micro-browsers include, but are not limited to browser launch, exiting a browser, navigating to a home page, clearing a cache, navigating to a webpage, reloading a webpage, getting the current info for a webpage, navigating back to a webpage, checking a page title, and capturing a screen, for example. Device features can also be manipulated to ensure consistency across the testing process. | 2010-06-10 |
20100146489 | AUTOMATIC COLLECTION OF DIAGNOSTIC TRACES IN AN AUTOMATION FRAMEWORK - A method for software test automation includes receiving system software in a test server; receiving test software and in a test server; configuring test environment resources for the test software; executing an automated test of the test software comprising: performing unit test of the test software; comparing anticipated performance results of the test software with actual results of the test software; determining whether there are differences in the anticipated performance and the actual performance; wherein in the event there are differences in the anticipated performance and the actual performance: applying trace settings; deleting runtime logs associated with the unit test; re-executing the unit test; storing trace data associated with the re-executed unit test; notifying a user of the re-executed unit test; providing the user with the stored trace data; and cleaning up the test environment resources. | 2010-06-10 |
20100146490 | METHOD FOR TESTING A COMPUTER PROGRAM - The invention relates to a method for testing a computer program after changing a first version of the computer program into a second version of the computer program due to a revision of the computer program. The method comprises the steps of | 2010-06-10 |
20100146491 | System for Preparing Software Documentation in Natural Languages - A software documentation preparing system which can prepare software documentation written in plural natural languages is provided. The software documentation preparing system uses input unit for inputting a source file including a source code statement written in a programming language and a comment assigned to the source code statement, in which source file, the comment describing one of functions in the source code is described in plural natural languages, each of the descriptions in the natural languages provided with a combined sign of a sign indicating the function and a sign indicating a type of natural language; interprets the input source file, identifies the combined sign, associates the sign with a source code statement, and stores a comment on memory; extracts only a comment provided with a sign corresponding to the type of the user-specified natural language to be output; and outputs software documentation in the natural language to be output for the source code statement based on the extracted comment. | 2010-06-10 |
20100146492 | TRANSLATION OF PROGRAMMING CODE - Embodiments of the invention may provide methods and/or systems for converting a source application to a platform-independent application. Source programming language code of the source application may be translated to target programming language code of the platform-independent application. The source programming language code may comprise Connected Limited Device Configuration (CLDC) code, and the platform-independent programming language may be independent of one or more device platforms. Further, one or more source resources associated with the source application may be converted to one or more target resources. | 2010-06-10 |
20100146493 | METHOD AND SYSTEM FOR PLATFORM-INDEPENDENT FILE SYSTEM INTERACTION - Embodiments disclosed can provide a simple, singular programmatic interface for application developers to access and manipulate ASCII and non-ASCII file specifications in a cross-platform development environment regardless of operating system encoding capabilities or of the nature of the original file specification encoding. An application development environment is configured on a computer system such that a magic class file string object is instantiated when a bit string of a first encoding is received. The bit string represents a file specification of a file containing application code written by an application developer. The magic class file string object automatically determines what target operating system is being called by a function call in the application code, automatically transcodes the bit string from the first encoding into a second encoding of the target operating system, and automatically makes a correct file system API call specific to the target operating system. | 2010-06-10 |
20100146494 | Compiler generator - A system including an input compiler that receives a unified input description containing syntax rules for both regular and context-free expressions and interspersed code, the first compiler configured to translate the unified input description into a common internal representation is disclosed. The system also includes a regular expression checker, a context-free expression checker, a code checker and a second compiler coupled to the code checker. | 2010-06-10 |
20100146495 | METHOD AND SYSTEM FOR INTERPROCEDURAL PREFETCHING - A computing system has an amount of shared cache, and performs runtime automatic parallelization wherein when a parallelized loop is encountered, a main thread shares the workload with at least one other non-main thread. A method for providing interprocedural prefetching includes compiling source code to produce compiled code having a main thread including a parallelized loop. Prior to the parallelized loop in the main thread, the main thread includes prefetching instructions for the at least one other non-main thread that shares the workload of the parallelized loop. As a result, the main thread prefetches data into the shared cache for use by the at least one other non-main thread. | 2010-06-10 |
20100146496 | Displaying Presentations - Included are embodiments of a presentation device. At least one embodiment of the device includes internal memory storage including at least one file; and a processing component coupled to the memory device, the processing component configured to, upon activation of the presentation device, automatically determine whether the at least one file is a compatible file and, in response to determining that the at least one file is a compatible file, automatically convert the at least one file into a sequence of signals that is sent for display as a presentation that includes at least one viewable image. | 2010-06-10 |
20100146497 | COMMUNICATIONS DEVICE WITH A PLURALITY OF PROCESSORS AND COMPATIBILITY SYNCHRONIZATION MODULE FOR PROCESSOR UPGRADES AND RELATED METHOD - A multiprocessor device includes a plurality of device subsystems each having a processor dependent on a respective other processor in another device subsystem for device operation. Each processor has at least one independent channel for updating a respective software version within the respective processor. A compatibility synchronization module has a database storing a table of compatible software versions for each processor. It is updated when a new software version for a processor is created. This table is independent of software images for the software versions. The compatibility synchronization module is operative for verifying if the software version for a processor is compatible with other software versions at other processors and instructs a respective device subsystem to revert back to a compatible software version within a respective processor or prevent any incompatible software updates within the processor. | 2010-06-10 |
20100146498 | METHOD TO MAKE SMP/E BASED PRODUCTS SELF DESCRIBING - Systems and methods of providing information from run-time installations of mainframe SMP/E based products. Information is embedded into a fingerprint library. The fingerprint library may then be associated with a product installed via SMP/E. The fingerprint library may then remain with the product when it is copied to its distributed location. A system administrator may later query the run-time installation and retrieve information previously only known to the SMP/E tool in an SMP/E controlled installation. In one embodiment, information may be embedded into a fingerprint library at product build time. | 2010-06-10 |
20100146499 | Controlling Access to Electronic Devices by Meeting Invitees - A meeting manager specifies controlled access to the use of an electronic device by sending a meeting request to at least one invitee, wherein the meeting request specifies access rights to control use during the meeting of least one feature of a plurality of features of at least one electronic device associated with the at least one invitee. The meeting manager requires the at least one invitee accept the access rights specified in the meeting request for controlling use at the at least one electronic device in order for the invitee to accept the meeting request. | 2010-06-10 |
20100146500 | Method and system for installing a software application on a mobile computing device - A method is disclosed of installing a software application, typically a security application such as a one-time password application, on a mobile computing device such as a mobile telephone or PDA. The method comprises creating an account for a user on a network, the account having user identification data including a user name, a user e-mail address and an address of a mobile computing device of the user. An invitation message is transmitted to the user, the invitation including a link to an installation web page. A deployment server supporting the installation web page receives an initial request from the user to install the software application, transmits data to the mobile computing device of the user and receives a response from the mobile computing device, from which one or more characteristics of the mobile computing device can be determined. When a confirmatory request is received at the deployment server from the mobile computing device to install the software application, the software application is transmitted to the mobile computing device and installed on it. The mobile computing device can then function like a dedicated hardware token. | 2010-06-10 |
20100146501 | METHOD AND APPARATUS FOR THE SECURE PROCESSING OF CONFIDENTIAL CONTENT WITHIN A VIRTUAL MACHINE OF A PROCESSOR - A secure virtual machine system, method, and computer program product implemented on a processor are provided for processing a third party's content for output. At least one processor is provided. Additionally, at least one secure virtual machine implemented on the processor is provided for interpreting a second party's program that processes and outputs a third party's content. The virtual machine system abstracts the underlying processor hardware allowing implementation variations across products to execute the same program identically. Furthermore, the scope of the programmable operations, the types of input & output variables, and execution of programs within the processor, is deliberately constrained within the virtual machine environment, in order to mitigate potential security leaks by programs, and to ensure confidentiality of second party's secrets, and third party's content as managed by the second party's program. | 2010-06-10 |
20100146502 | PLATFORM DEPENDENT REPLACEMENT OF DIGITAL CONTENT ASSET COMPONENTS - Systems and methods provide an operation of digital content assemblages such as video games with a digital processor so as to control platform dependent replacement of digital asset components. In an example embodiment, a video game package is operated on a first platform. The video game includes one or more first digital asset components such musical and/or graphical works. Platform association data is accessed to evaluate an association between the first digital asset component and the first platform. The platform association data is checked for a concurrence between the platform association data and platform data. A second digital asset component is substituted for the first digital asset component in accordance with the check of the platform association data to permit the operating of the digital content assemblage with the second digital asset component as a replacement for the first digital asset component. | 2010-06-10 |
20100146503 | SCHEDULER OF VIRTUAL MACHINE MODULE, SCHEDULING METHOD THEREFOR, AND DEVICE CONTAINING COMPUTER SOFTWARE - A scheduler of a virtual machine (VM) module, a scheduling method thereof, and a device containing computer software are provided. The scheduler has a classification module and a scheduling module. The classification module receives at least one VM module and analyzes a resource proportion parameter to generate classification result information. The scheduling module has a first schedule queue and a second schedule queue, sort an immediately resource-required VM module to the first schedule queue and a non immediately resource-required VM module to the second schedule queue, and determine whether the VM module of the first schedule queue exists or not, and if yes, it outputs the VM module of the first schedule queue to a processor; otherwise, outputs the VM module of the second schedule queue to the processor. | 2010-06-10 |
20100146504 | VIRTUAL MOBILE INFRASTRUCTURE AND ITS BASE PLATFORM - The invention published here covers a virtual mobile infrastructure (VMI) and its base platform. The base platform comprises several hosts. On a host OS, a QEMU process is used to virtualize at least one guest cell phone operating system. A data center manages these cell phone OSes generated by this base platform, allocates the OSes to users, and allows communication between cell phone client and server via mobile terminal protocol similar to RDP. A virtual machine (VM) switch contains a method to use the VMI of this published invention, and to acquire adapted cell phone screen and inexpensive cell phone VM. In one embodiment, a VMI product is able to encapsulate the third-party VDI products (such as Citrix XenDesktop, LeoStream, etc.), henceforth to acquire screens from PC VM as well. Moreover, a VM manager allows administrators of enterprises or telcos to manage thousands of VMs. | 2010-06-10 |
20100146505 | Multi-monitor, multi-JVM Java GUI infrastructure with layout via XML - A method and system are provided which allows enhanced support to graphical user interface (GUI) displays on multiple monitors. An extended markup language file provides code to configure each GUI. GUI software need not be re-compiled in order to implement changes in the layout of displays or to accommodate additional monitors. Potential display event handling delays are minimized by providing multiple Java Virtual Machines (JVMs) for GUIs. In one aspect, one JVM is provided for each GUI. | 2010-06-10 |
20100146506 | SYSTEM AND METHOD FOR OFFERING SYSTEM ON DEMAND (SoD) VIRTUAL-MACHINE - There are provided a system for offering a SoD virtual-machine includes a main server that includes: a server communication unit that transmits and receives data to and from a plurality of peripheral devices and a plurality of user terminals; a peripheral device detection unit that detects one or more peripheral devices among peripheral devices around the user terminal on the basis of user information received from the user terminal connected through the server communication unit and peripheral device information around the user terminal; and a server control unit that sets one or more peripheral devices detected by the peripheral device detection unit as IO devices of a virtual machine allocated to the connected user terminal. | 2010-06-10 |
20100146507 | SYSTEM AND METHOD OF DELIVERY OF VIRTUAL MACHINE USING CONTEXT INFORMATION - There is provided a system of delivery of a virtual machine using context information. The system of delivery of a virtual machine includes: a context information manager that receives one or more user context information from a user terminal device; and a virtual machine generator that generates a virtual machine suitable for the user terminal device in accordance with the one ore more received user context information and outputs the generated virtual machine to the user terminal device. | 2010-06-10 |
20100146508 | NETWORK DRIVEN ACTUATOR MAPPING AGENT AND BUS AND METHOD OF USE - A system and method for a network driven actuator mapping agent and bus. The system includes at least one sensor configured to sense an event in a first environment. The system also includes an actuator configured to perform an action in a second environment. Moreover, the system further includes a mapping manager configured to map the sensed event to the actuator to provide a custom interaction throughout a plurality of second environments. | 2010-06-10 |
20100146509 | SELECTION OF TRANSACTION MANAGERS BASED ON TRANSACTION METADATA - One or more transaction managers are automatically selected from a plurality of transaction managers for use in processing a transaction. The selection is based on types of resources used by the transaction and supported resource types of the transaction managers. The selection of the one or more transaction managers enables less than all of the transaction managers of an application server to be used in transaction commit processing, thereby improving performance. | 2010-06-10 |
20100146510 | Automated Scheduling of Mass Data Run Objects - Techniques are described in which indication of a computer application to be configured for use in a particular business enterprise is received. A mass data run object is identified. The mass data run object defines a computer operation to be performed by the computer application to transform business transaction data as part of a business process. The mass data run object identifies i) selection parameters to select business transaction data to be transformed by the computer operation defined by the mass data run object and ii) instructions, that when executed, perform the computer operation to transform the selected business transaction data. A mass data run object instance corresponding to the identified mass data run object is generated and scheduled for execution. | 2010-06-10 |
20100146511 | POLICY BASED DATA PROCESSING METHOD AND SYSTEM - Provided is a policy-based data processing system and method. A pattern analyzer of the data processing system generates a pattern handler based on a pattern, schedules the generated pattern handler based on a policy to filter and group data, generates a processing function corresponding to a process type for each data type of event data into an object module, and uses it by handling it through a pattern handler. | 2010-06-10 |
20100146512 | Mechanisms for Priority Control in Resource Allocation - Mechanisms for priority control in resource allocation is provided. With these mechanisms, when a unit makes a request to a token manager, the unit identifies the priority of its request as well as the resource which it desires to access and the unit's resource access group (RAG). This information is used to set a value of a storage device associated with the resource, priority, and RAG identified in the request. When the token manager generates and grants a token to the RAG, the token is in turn granted to a unit within the RAG based on a priority of the pending requests identified in the storage devices associated with the resource and RAG. Priority pointers are utilized to provide a round-robin fairness scheme between high and low priority requests within the RAG for the resource. | 2010-06-10 |
20100146513 | Software-based Thread Remapping for power Savings - On a multi-core processor that supports simultaneous multi-threading, the power state for each logical processor is tracked. Upon indication that a logical processor is ready to transition into a deep low power state, software remapping (e.g., thread-hopping) may be performed. Accordingly, if multiple logical processors, on different cores, are in a low-power state, they are re-mapped to same core and the core is then placed into a low power state. Other embodiments are described and claimed. | 2010-06-10 |
20100146514 | TEST MANAGEMENT SYSTEM AND METHOD - An execution management method includes providing an execution plan, balancing an execution load across a plurality of servers, automatically interpreting the execution plan, and re-driving a failed test to another of the plurality of servers if the test case fails on an originally selected available server. The execution plan includes a plurality of test cases and criteria corresponding to the test cases. More than one of the plurality of test cases may be run on each of the plurality of servers at a same time in parallel. Each of the plurality of servers is run independently. | 2010-06-10 |
20100146515 | Support of Non-Trivial Scheduling Policies Along with Topological Properties - A system and method for scheduling jobs in a multiprocessor machine is disclosed. The status of resources, including CPUs on node boards and associated shared memory in the multiprocessor machine is periodically determined. The status can indicate the resources available to execute jobs. This information is accumulated by the topology-monitoring unit and provided to the topology library. The topology library also receives a candidate host list from the scheduling unit which lists all of the resources available to execute the job being scheduled based on non-trivial scheduling. The topology library unit then uses this to generate a free map F indicative of the interconnection of the resources available to execute the job. The topology monitoring unit then matches the jobs to the resources available to execute the jobs, based on resource requirements including shape requirements indicative of interconnections of resources required to execute the job. The topology monitoring unit dispatches the job to the portion of the free map F which match the shape requirements of the job. If the topology library unit determines that no resources are available to execute the job, the topology library unit will return the job to the scheduling unit and the scheduling unit which will wait until the resources become available. The free map F may include resources which have been suspended or reserved in previous scheduling cycles, provided the job to be scheduled satisfies the predetermined criteria for execution of the job on the suspended, have a lower priority, or are reserved resources. | 2010-06-10 |
20100146516 | Distributed Task System and Distributed Task Management Method - A distributed task system has a task transaction server and at least one task server. Instead of being merely passively called by the task transaction server for executing a task, the task server performs self-balancing according to task execution conditions and operation conditions of the task server. The task transaction server receives task requests from the task server, records the execution conditions, and provides feedback to the task server, and the task server executes the task according to the received feedback and the operation conditions of the task server. The task transaction server may determine if the task server can execute the task according to the execution conditions of the task, and feedback to the task server. A self-balancing unit of the task server may further determine whether the task server is busy, and if not busy, trigger a task execution unit of the task server to execute the task. | 2010-06-10 |
20100146517 | SYSTEM AND METHOD FOR A RATE CONTROL TECHNIQUE FOR A LIGHTWEIGHT DIRECTORY ACCESS PROTOCOL OVER MQSERIES (LOM) SERVER - A system and method for controlling rates for a Lightweight Directory Access Protocol (LDAP) over MQSeries (LoM) server. The system comprises a health metrics engine configured to calculate an actual delay value, at least one LoM server configured to asynchronously obtain the actual delay value from the health metrics engine and place the delay value between one or more requests, and a LDAP master configured to accept the one or more requests and send information in the one or more requests to a LDAP replica. | 2010-06-10 |
20100146518 | All-To-All Comparisons on Architectures Having Limited Storage Space - Mechanisms for performing all-to-all comparisons on architectures having limited storage space are provided. The mechanisms determine a number of data elements to be included in each set of data elements to be sent to each processing element of a data processing system, and perform a comparison operation on at least one set of data elements. The comparison operation comprises sending a first request to main memory for transfer of a first set of data elements into a local memory associated with the processing element and sending a second request to main memory for transfer of a second set of data elements into the local memory. A pair wise comparison computation of the all-to-all comparison of data elements operation is performed at approximately a same time as the second set of data elements is being transferred from main memory to the local memory. | 2010-06-10 |
20100146519 | SCA SYSTEM AND METHOD FOR OPERATION WAVEFORM APPLICATION THEREOF - Disclosed is an SCA system. The SCA system includes: a domain profile in which mutual dependency information defined between a plurality of components of a waveform application is stored; and an assembly controller that simultaneously operates at least one component without dependency among a plurality of components according to the mutual dependency information stored in the domain profile. | 2010-06-10 |
20100146520 | EVENT FILTERING AT A PERFORMANCE-BASED INTERFACE - Architecture that facilitates performance enhancement in message-based computing across a performance-based interface. When a request from a source is transmitted across the interface to a destination, a filter component in communication with the destination dynamically allows only one or more relevant responses from the destination to transition the interface to the source. This mechanism achieves an even tighter filtering of events while at the same time giving developers more flexibility over the events they choose to register, thereby enhancing the performance of message-based computing architectures by reducing unnecessary computation. | 2010-06-10 |
20100146531 | ESTIMATING REACH AND FREQUENCY OF ADVERTISEMENTS - Estimating the reach and device frequency of a proposed advertising campaign based on the probability that advertising content delivery devices (e.g., a television set top box, radio) were used to deliver advertising content (e.g. television ad, radio ad) during specific time periods on specific delivery device channels. | 2010-06-10 |
20100146532 | CHANNELS AND SERVICES DISPLAY - The availability of a new information service is publicized by displaying an icon in an EPG when the presence of a new information service is detected. A list of new services is then displayed responsive to a user command. When one of the new services is displayed instead of the list. | 2010-06-10 |
20100146533 | Listing Advertisement Transmitting Device and Method - [Problems] To provide a technique of fusing advertisement through broadcasting with that through a network out of advertisement media, especially a technique of producing a high advertisement effect by automatically synchronizing the advertisement timing and by optimizing the display form. | 2010-06-10 |
20100146534 | System and Method to Authenticate a Set-Top Box Device - A method includes receiving, at a residential gateway, an authentication request from a set-top box device. The method includes accessing authentication data stored at a memory of the residential gateway. The authentication data is associated with the set-top box device. The method also includes authenticating the set-top box device at the residential gateway based at least partially on the authentication data. | 2010-06-10 |
20100146535 | METHOD AND DEVICE FOR AGE DEPENDENT PREVENTION OF CONSUMATION OF CENSORED AUDIO AND/OR AUDIOVISUAL PROGRAMS - A method and a device ( | 2010-06-10 |
20100146536 | PARENTAL MEDIA PALETTES - Systems and methods for viewing media content are provided. Sets of permitted media content and/or channels that have been screened in advance by parents are created. Content suggestions may also be made. In response to media set creation and activation, permitted programming in the media set may be tuned and presented to a viewer while access to other media content is restricted. | 2010-06-10 |
20100146537 | BROADCASTING SERVICE SYSTEM USING MOBILE COMMUNICATION TERMINAL - A system capable of receiving a television signal and telephone signal on a mobile communication terminal. In particular, the system is capable of displaying each television broadcast on a monitor of the mobile communication terminal by receiving the video and audio signal, decoding it, and outputting it to the monitor of the mobile communication terminal. In addition, the system can transmit an EPG (Electronic Program Guide) data corresponding to a subscriber request and a selected broadcasting program in real time. | 2010-06-10 |
20100146538 | METHOD AND APPARATUS FOR TRANSMITTING/RECEIVING BROADCASTING PROGRAM ID - Provided is a method and apparatus for transmitting/receiving broadcasting program ID for identifying a broadcasting program along with a broadcasting program. The method for transmitting a broadcasting program, includes: acquiring audio/video bitstream for at least one broadcasting program; acquiring a broadcasting program identification (ID) corresponding to the broadcasting program; generating a media file including the audio/video bitstream and metadata; and transmitting the media file, wherein the metadata includes the broadcasting program ID and reference information for the audio/video bitstream. | 2010-06-10 |
20100146539 | Methods, Systems, and Products for Media On-Demand - The present invention is a system and method for multimedia-on-demand services. In an embodiment, a multimedia-on-demand system includes a mass storage device that receives and stores a multimedia content item. A processor and a memory are coupled to the mass storage device. The memory can store a multimedia-on-demand data table and multimedia-on-demand instructions. The multimedia-on-demand data table can include a multimedia content identifier field adapted to store a multimedia content identifier, where the multimedia content identifier corresponds to a multimedia content item stored on the mass storage device. The multimedia-on-demand data table can also include a multimedia content usage indicator field adapted to store a multimedia content usage indicator, where the multimedia content usage indicator is associated with the multimedia content item stored on the mass storage device. The multimedia-on-demand instructions can be executed by the processor and can include instructions to automatically receive the multimedia content item. The multimedia-on-demand instructions can also send a multimedia-on-demand usage message, where the multimedia-on-demand usage message is based at least in part on the multimedia content usage indicator. | 2010-06-10 |
20100146540 | RECEIVING DEVICE, COMMUNICATIONS SYSTEM, RECEIVING DEVICE CONTROL METHOD AND PROGRAM - A receiving device according to the present invention includes a receiving portion that acquires main program data and CM data via a communications network and a control portion that acquires a CM display time included in the main program data, displays the main program data during a time period other than the CM display time and displays the CM data during the CM display time. When one of a timing at which a power source is switched on and a timing at which a channel is changed coincides with the CM display time, the control portion does not display the CM data and displays the main program data during the CM display time. | 2010-06-10 |
20100146601 | Method for Exercising Digital Rights via a Proxy - A system and method for accessing digital content purchased by a rights owner for a first computing device. The method receives a proxy from the rights owner that includes rights to the digital content granted to the rights owner, stores the proxy on a second computing device, and determines whether the rights owner is present at the second computing device. When the rights owner is present at the second computing device, the method enables the proxy, and accesses the digital content on the second computing device through the proxy. | 2010-06-10 |
20100146602 | CONDITIONAL SUPPLEMENTAL PASSWORD - A password protected machine where a primary alternative password and a secondary alternative password are assigned, but the secondary alternative password cannot be used to gain access unless and until the primary alternative password has been deactivated. Also, a password protected machine where a user is assigned at least two alternative passwords, and where the use of one alternative password will automatically deactivate the other password. Preferably, there is a primary password and a secondary password such that: (i) the use of the primary password does not deactivate the secondary password, but (ii) the use of the secondary password does deactivate the primary password. | 2010-06-10 |
20100146603 | ANONYMOUS AUTHENTICATION-BASED PRIVATE INFORMATION MANAGEMENT SYSTEM AND METHOD - An anonymous authentication-based private information management (PIM) system and method are provided. The PIM method includes receiving an anonymous certificate not including user information from an anonymous certification authority; generating an anonymous document including the anonymous certificate and some of the user information; and providing the anonymous document to a web service provider so as to be authenticated and thus provided with a web service by the web service provider. Thus, only a minimum of user information may be provided to the web service provider. In addition, it is possible to strengthen a user's right to self-determination and control over the exposure and use of his or her personal information by allowing a user to manage his or her own personal information or entrusting the PIM server to manage user information. Moreover, it is possible to protect the privacy of a user by preventing the exposure of user information. | 2010-06-10 |
20100146604 | Password protection system and method - A system and method for providing a password to a user on a network, the network having provider computer and a user computer, the provider computer comprising a password system configured to issue a password to a user of the user computer for use in accessing age-restricted content once a determination has been made that the user is age appropriate. | 2010-06-10 |
20100146605 | METHOD AND SYSTEM FOR PROVIDING SECURE ONLINE AUTHENTICATION - Methods and systems for authenticating website users without exposing passwords or other sensitive information to potential theft are provided. When the user's computer connects to a website server all communications are routed through a secure authentication device. When the authentication device identifies the need for user information to be submitted to the website server, the application retrieves the required information from memory and inserts the information into the appropriate location in the website forms. Since the secure connection to the website server is established in the secure boundary of the authentication device, the information is protected from being obtained by any malware that may reside in the user's computer. | 2010-06-10 |
20100146606 | AUTHENTICATION METHOD AND SYSTEM - An authentication method and system. A computing system generates an authentication table associated with a user. The computing system receives first authentication data and second authentication data differing from the first authentication data. The first authentication data and the second authentication data are placed in the authentication table. The authentication table comprising the first authentication data and the second authentication data is stored in the computing system. The computing system generates an action table. The computing system receives first action data and second action data and places the first action data and the second action data in the action table. The action table comprising the first action data and the second action data is stored in the computing system. | 2010-06-10 |
20100146607 | System and Method for Managing Multiple Sub Accounts Within A Subcriber Main Account In A Data Distribution System - A computer readable storage medium is disclosed having a computer program stored therein, which in a particular embodiment, the computer program includes but is not limited to machine readable instructions that when executed by a computer manage a plurality of sub accounts under a main account in a data distribution system, the computer program including but not limited to instructions to assign the plurality of sub accounts under the main account in a main account data structure at a server in the data distribution system; instructions to assign a plurality of end user devices to each one of the plurality of sub accounts; and instructions to receive end user device attribute data from at least one of the end user devices to the main account data structure after the attribute data is created at the at least one end user device. | 2010-06-10 |
20100146608 | Multi-Level Secure Collaborative Computing Environment - In some embodiments, a collaborative computing environment includes a federated identity manager coupled to a multi-level secure computing network and a client having a biometric reading device. The multi-level secure computing network includes multiple data repositories that store information according to a ranked classification system comprising multiple security levels. The federated identity manager has a storage device that is operable store a plurality of identity tokens each associated with a corresponding one of a plurality of users. In operation, the federated identity manager receives, from the biometric reading device, a biometric signature associated with a particular one of the users, initiates a login session with the client according to the received biometric signature associated with the particular user, and restricts access to the information stored in the data repositories according to one or more security levels associated with the particular user as specified by the identity token associated with the particular user. | 2010-06-10 |
20100146609 | METHOD AND SYSTEM OF SECURING ACCOUNTS - A method and system of securing account is provided. When a client computer requests access to an account accessible via a server, the server determinates a mac address associated with the client computer and compares it to a mac address associated with the account. If the mac address of the client computer is not the same as the mac address associated with the account, the server initially denies access to the client computer, but may allow access after verification of the client computer by the user associated with the account. | 2010-06-10 |
20100146610 | NODE AUTHENTICATION AND NODE OPERATION METHODS WITHIN SERVICE AND ACCESS NETWORKS IN NGN ENVIRONMENT - Provided are node authentication and node operation methods within service and access networks for bundle authentication between the service and access networks in a next generation network (NGN). A method of authentication processing of a node (S-CSC-FE/I-CSC-FE (Serving Call Session Control Functional Entity/Interrogating Call Session Control Functional Entity)) within a service network for bundle authentication between service and access networks, the method including: receiving first authentication information about access authentication of a terminal from a first node within the service networks; requesting to receive second authentication information from a second node within the service network based on the first authentication information; and comparing the first authentication information with the second authentication information to authenticate the terminal. | 2010-06-10 |
20100146611 | Credential Sharing Between Multiple Client Applications - Disclosed are techniques for sharing user credentials between multiple client applications when connecting to a set of remote resources. The mechanism enables a single sign-on between a terminal server web access service and the remote applications, remote desktops and corresponding terminal servers accessible through the service. User credentials may be received by one of the client applications and passed to a credential store running as a local software object in association with the user's logon session. Further requests to launch a new remote connection may then pass through the credential store. Upon successful validation of the request, the credential store may attach user credential information to the request and pass the request to the requested client. The requested client may also execute as a software object associated with the current logon session. The client may then use the supplied credential for authentication to the requested resource or application. | 2010-06-10 |
20100146612 | METHOD AND APPARATUS FOR TRUST-BASED, FINE-GRAINED RATE LIMITING OF NETWORK REQUESTS - A method and apparatus for fine-grained, trust-based rate limiting of network requests distinguishes trusted network traffic from untrusted network traffic at the granularity of an individual user/machine combination, so that network traffic policing measures are readily implemented against untrusted and potentially hostile traffic without compromising service to trusted users. A server establishes a user/client pair as trusted by issuing a trust token to the client when successfully authenticating to the server for the first time. Subsequently, the client provides the trust token at login. At the server, rate policies apportion bandwidth according to type of traffic: network requests that include a valid trust token are granted highest priority. Rate policies further specify bandwidth restrictions imposed for untrusted network traffic. This scheme enables the server to throttle untrusted password-guessing requests from crackers without penalizing most friendly logins and only slightly penalizing the relatively few untrusted friendly logins. | 2010-06-10 |
20100146613 | SYSTEM AND METHOD FOR PROVIDING SILENT SIGN ON ACROSS DISTRIBUTED APPLICATIONS - A system and method is provided for a distributed computing system where a user can login to a client computer and access a number of different applications installed on web servers. These applications are then provided access to data in mainframe systems without a user having to enter mainframe user id or password information for gaining access to the mainframe system. The system and method can utilize a sign on object which is installed onto the client computer. The sign on object operates to obtain and transmit a security token which authorizes access to the mainframe system, and the security token does not require the use of the cookie data. This system and method can pass the security token through the web server and the web application in an encrypted form which limits security risks. | 2010-06-10 |
20100146614 | Devices and Methods for Secure Internet Transactions - Devices and methods are disclosed which provide a mobile communications device with multiple methods of wireless communication which can use one method, such as WiFi, to connect to an independent wireless access point while using another method, such as cellular, to verify the security of the wireless access point. The wireless access point provides two SSID's: one private SSID, which is usually encrypted to prevent access, and one public SSID, which is open to any mobile communications device. The mobile communications device connects to the public SSID and downloads a digital certificate. The mobile communications device then uses its cellular connection to verify the authenticity of the digital certificate with its service provider. If verified, the mobile communications device can make use of the wireless access point. | 2010-06-10 |
20100146615 | Systems and Methods for Inhibiting Attacks on Applications - In accordance with some embodiments of the present invention, systems and methods that protect an application from attacks are provided. In some embodiments of the present invention, input from an input source, such as traffic from a communication network, can be routed through a filtering proxy that includes one or more filters, classifiers, and/or detectors. In response to the input passing through the filtering proxy to the application, a supervision framework monitors the input for attacks (e.g., code injection attacks). The supervision framework can provide feedback to tune the components of the filtering proxy. | 2010-06-10 |
20100146616 | COOPERATION FOR CONSUMER AND SERVICE PROVIDER MOCA NETWORKS - Embodiments may be disclosed herein that provide systems, devices, and methods of operating a Multimedia over Coax (MoCA) network. One such embodiment is a method comprising: designating a selected MoCA device as a network controller; and logically partitioning, into virtual MoCA networks, a predetermined bandwidth reserved for the MoCA network by sending, from the network controller one or more beacons containing virtual network information. | 2010-06-10 |
20100146617 | UNIFYING RELATED WEB SERVICE PORTS USING PORT POINTERS IN PROXY MEDIATION - A Web service description can be extended to cross reference a front-side port associated with a client using a Web service and a back-side port associated with a server providing the Web service. The extending of the Web service description can occur in a standards compliant manner for a programming language within which the Web service description is specified and for a repository in which the Web service description is maintained. | 2010-06-10 |
20100146618 | Multi-Level Secure Information Retrieval System - According to one embodiment, a multi-level secure information retrieval system includes an enterprise access service tool coupled to one or more client applications and at least one gateway managed by an enterprise. The enterprise access service tool executes services operating in a service oriented architecture. The enterprise access service tool receives requests from the client applications, associates each of the requests with one of a plurality of differing security levels, and transmits the requests to the gateway. The gateway transmits the requested information back to the client applications in which the information is filtered by the gateway according to their associated security levels. | 2010-06-10 |
20100146619 | ELECTRONIC DEVICE AND ACCESS CONTROL METHOD THEREOF - An electronic device and method for controlling access to an electronic device includes setting a username and a password of an authorized user, and creating a keystroke biometric template of the authorized user. The electronic device and method further includes receiving an input username and an input password of a user, and recording keystroke dynamics of the user, and determining an identification of the user by identifying the input username and the input password of the user and determining if keystroke characteristic values of the user match the keystroke biometric template of the authorized user. | 2010-06-10 |
20100146620 | Centralized Device Virtualization Layer For Heterogeneous Processing Units - A method for providing an operating system access to devices, including enumerating hardware devices and virtualized devices, where resources associated with a first hardware device are divided into guest physical resources creating a software virtualized device, and multiple instances of resources associated with a second hardware device are advertised thereby creating a hardware virtualized device. First and second permission lists are generated that specify which operating systems are permitted to access the software virtualized device and the hardware virtualized device, respectively. First and second sets of virtual address maps are generated, where each set maps an address space associated with either the software virtualized device or the hardware virtualized device into an address space associated with each operating system included in the corresponding permission list. The method further includes arbitrating access requests from each of the plurality of operating systems based on the permission lists and the virtual address maps. | 2010-06-10 |
20100146631 | METHOD AND SYSTEM FOR THE SECURE DISTRIBUTION OF DIGITAL DATA - The application relates to a method for the secure distribution of digital data transmitted to a client station, said digital data being in a first digital format of a non audiovisual nature, said method implementing a protection device able to protect data in a second digital format and to transmit them to said client station. According to the invention, said second format is of an audiovisual nature and the method includes a step of converting digital data in said first digital format, into said second format. | 2010-06-10 |
20100146632 | REPRODUCTION RULE EVALUATION DEVICE, REPRODUCTION RULE EVALUATION METHOD, RECORDING MEDIUM AND PROGRAM - When a viewer views content, it is reproduced by a reproduction procedure depending on a dynamic condition set in the content. Here, a content object data input unit obtains an externally-input content object. The content object is stored in a content object data retention unit, if necessary. The content object includes a reproduction rule and a content data. A reproduction rule evaluation and execution unit obtains the reproduction rule in the content object and performs processing in accordance with the reproduction rule. The reproduction unit reproduces a reproducible data specified by the reproduction rule evaluation and execution unit. An identifier management unit retains an identifier of a content object reproduction device and provides the identifier upon request. It is thus possible to reproduce in accordance with the reproduction rule set in the content object data and to control the reproduction procedure depending on the dynamic condition. | 2010-06-10 |
20100146633 | Memory Controller,Non-Volatile Storage Device, Non-Volatile Storage System,Access Device, and Data Management Method - In a memory controller according to the present invention, an external I/F unit receives ID information associated with data from the outside of a non-volatile memory, and a recording controller manages a recording position of the data in the non-volatile memory based on the ID information, so that an amount of time necessary for the retrieval of rights information based on the ID information is reduced. | 2010-06-10 |
20100146634 | DATA PROTECTION DEVICE AND METHOD - Provided is a data protecting device and method. When a specific application requests an access to sealed data, an operating system generates application identity information without interruption by the corresponding application, and writes the generated application identity information in a platform configuration register that can be reset in a trusted platform module. Upon having received the unsealing request, the trusted platform module transmits data to the application when the unsealing condition included in the sealed data block corresponds to the state value of the currently operated platform written in a platform configuration register in the trusted platform module. | 2010-06-10 |
20100146635 | METHOD OF IMPROVING SYSTEM PERFORMANCE AND SURVIVABILITY THROUGH SELF-SACRIFICE - A biologically-inspired system and method is provided for self-adapting behavior of swarm-based exploration missions, whereby individual components, for example, spacecraft, in the system can sacrifice themselves for the greater good of the entire system. The swarm-based system can exhibit emergent self-adapting behavior. Each component can be configured to exhibit self-sacrifice behavior based on Autonomic System Specification Language (ASSL). | 2010-06-10 |
20100146636 | APPARATUS AND METHOD FOR RECORDING AND REPRODUCING IMAGES - Provided is imparting authentication codes to image data photographed by a camera connected to the apparatus for recording and reproducing images to generate encryption data and monitors control instructions input from the outside to the apparatus for recording and reproducing images, thereby interrupting the control instructions that store or cancel the image data stored in the apparatus for recording and reproducing images. As a result, the integrity of the image data cannot be questioned. Further, when the image data stored in the apparatus for recording and reproducing images are submitted as evidence, the integrity of the image data and the information on the corresponding image data submitted as evidence can be verified by using the authentication data generated for the original image data. | 2010-06-10 |
20100146637 | METHOD FOR MOVING RIGHTS OBJECT IN DIGITAL RIGHTS MANAGEMENT - A method for moving Rights Object (RO) in a Digital Rights Management (DRM). RO for content is partially or entirely moved between Devices in the same group, so that the RO can be shared between the Devices and a utility thereof can be enhanced. | 2010-06-10 |
20100146638 | DETECTION FILTER - A detection filter installed in an application server including a secure application is disclosed. In one embodiment, the filter includes a rules engine for receiving request data representing an access request for the secure application from a user. The engine applies at least one risk condition rule to the request data to generate a risk probability level, and detects at least one fraud condition when the risk probability level exceeds a threshold level, before passing the access request to the secure application. | 2010-06-10 |
20100146639 | ONLINE DIRECTORY WITH CONTACT INFORMATION - A method and system of storing and sharing contact information on a website of a specified group of users designated by a user X comprises: accessing the website by the user X; requesting the user X to provide or verify accuracy of most current contact information as a precondition to proceeding; storing the most current contact information from the user X and each user of the specified group of users; providing shared online access to contact information of user X to all users of the group; updating contact information of user X each time the website is accessed by User X; and updating contact information of each user of the group when contact information of a user of the group changes. | 2010-06-10 |
20100146640 | Method and device for distributing electronic documents - Embodiments provide a method and device for distributing an electronic document. The electronic document possesses first authorized copies information used to record a first number of authorized copies for the electronic document a local user may distribute. Every time the electronic document is distributed to a user, second authorized copies information is sent to the user, which second authorized copies information is used to record a second number of authorized copies for the electronic document the user may distribute, and the second number of authorized copies is less than or equal to the first number of authorized copies currently recorded in the first authorized copies information. | 2010-06-10 |
20100146641 | METHOD AND DEVICE FOR PROTECTION OF AN MRAM DEVICE AGAINST TAMPERING - Data, stored in MRAM-cells should be protected against misuse or read-out by unauthorised persons. The present invention provides an array of MRAM-cells provided with a security device for destroying data stored in the MRAM-cells when they are tampered with. This is achieved by placing a permanent magnet adjacent the MRAM-array in combination with a soft-magnetic flux-closing layer. As long as the soft-magnetic layer is present, the magnetic field lines from the permanent magnet are deviated and flow through this soft-magnetic layer. When somebody is tampering with the MRAM-array, e.g. by means of reverse engineering, and the flux-closing layer is removed, the flux is no longer deviated and affects the nearby MRAM-array, thus destroying the data stored in the MRAM-cells. | 2010-06-10 |
20100146642 | Methods and compositions relating to PBK1 - The invention relates to compositions comprising, and methods utilizing PBK1 protein and DNA, including a method of detecting type 1 diabetes; a mammalian pancreas-derived cell comprising a recombinant nucleic acid encoding a PBK1 protein; a method of identifying a PBK1 modulator; a pharmaceutical composition for treatment of type 2 diabetes in a subject; a method of screening for an agent that treats a metabolic disease; delivery of PBK-1 DNA to a subject to stimulate pancreatic beta cell differentiation and/or regeneration; a method for stimulating cell differentiation and/or regeneration in a pancreatic beta cell; usage of transgenic mice with targeted deletion or overexpression of the PBK-1 gene to test efficacy and specificity of PBK-1 modulator compounds. | 2010-06-10 |
20100146643 | RAPID IN VIVO MODEL FOR ANGIOGENESIS - An animal model of angiogenesis is described. Nascent blood vessels are supported by a growth matrix comprising a growth factor. The nascent blood vessels are labeled with a fluorescent protein selectively expressed in cells forming these vessels. | 2010-06-10 |
20100146644 | TRANSGENIC NON-HUMAN ANIMAL - A transgenic non-human animal genetically modified to have a dysfunctional 26S-proteasome in some or all cells, which may exhibit phenotypic and/or neuropathological symptoms similar to those exhibited by individuals with a neurogenerative disorder. | 2010-06-10 |
20100146645 | TRANSGENIC ANIMAL MODEL FOR MODELLING PATHOLOGICAL ANXIETY, A METHOD FOR IDENTIFYING COMPOUNDS FOR TREATMENT OF DISEASES OR DISORDERS CAUSED BY PATHOLOGICAL ANXIETY AND A METHOD FOR USING WFS1 PROTEIN AS A TARGET FOR IDENTIFYING EFFECTIVE COMPOUNDS AGAINST PATHOLOGICAL ANXIETY - The invention discloses the transgenic animal model for pathological anxiety, the method to generate this model, the method to test drugs and drug candidates for the treatment of pathological anxiety and the method to use Wfs1 as target for screening of new anxiolytic drugs to treat pathological anxiety. This animal model is useful to test potential drug candidates for the treatment of diseases caused by pathological anxiety and to screen therapeutic compounds for the psychiatric disorders caused by reduces stress-tolerance and deficiency in adaptation to environmental challenges. | 2010-06-10 |
20100146646 | METHOD OF MONITORING RETINOPATHY - There is presently provided methods of monitoring retinopathy in a live transgenic, non-human animal, the methods comprising providing a live transgenic non-human animal having a retinal pathology or a pre-disposition for a retinal pathology, wherein a nucleic acid molecule encoding a fluorescent protein under control of a GFAP promoter is integrated into the genome of the transgenic non-human animal; and detecting in vivo in the retinal glia of the transgenic non-human animal fluorescence levels of the fluorescent protein. | 2010-06-10 |
20100146647 | Antibody producing non-human mammals - Described are transgenic, non-human animals comprising a nucleic acid encoding an immunoglobulin light chain, whereby the immunoglobulin light chain is human, human-like, or humanized. The nucleic acid is provided with a means that renders it resistant to DNA rearrangements and/or somatic hypermutations. In one embodiment, the nucleic acid comprises an expression cassette for the expression of a desired molecule in cells during a certain stage of development in cells developing into mature B cells. Further provided is methods for producing an immunoglobulin from the transgenic, non-human animal. | 2010-06-10 |
20100146648 | Immunosuppression by blocking T cell co-stimulation signal 2 (B7/CD28 interaction) - The invention provides means and methods for inhibiting T-cell mediated rejection of a xenotransplanted organ by blocking the delivery of co-stimulatory signal 2 (the B7/CD28 interaction) in order to prevent the activation of xenoreactive T-cells in the recipient. In a first aspect, co-stimulation is prevented by administration to the organ recipient of a soluble form of CTLA-4 from the xenogeneic donor organism. This preferentially binds B7 on the xenograft and blocks the interaction between B7 on the xenogeneic donor cells and CD28 on recipient T-cells. In a second aspect, co-stimulation is antagonised by expressing a ligand for CTLA-4 on the xenogeneic donor cells. This ligand binds to CTLA-4 on activated T-cells of the recipient and antagonises signal 2. In a third aspect, co-stimulation is prevented by expressing recipient organism MHC class II on the surface of the cells of the xenogeneic donor organ. The donor cells are thus able to present xenoantigens to a recipient T-cell in the context of self-MHC class II. If the donor cells do not express B7, or if B7 is blocked, the xenoreactive recipient T-cell becomes anergic. | 2010-06-10 |
20100146649 | Purkinje Cell-Tropic Viral Vector - The present invention relates to a Purkinje cell-tropic viral vector in which a modified L7 promoter and a therapeutic gene are operably linked to a virus-based plasmid vector. | 2010-06-10 |
20100146650 | METHOD FOR GENERATING ACTIVE ANTIBODIES AGAINST A RESISTANCE ANTIGEN, ANTIBODIES OBTAINED BY SAID METHOD AND THEIR USES - The present invention relates to the use of a milled homogenate and/or a suspension and/or a cell lysate, stemming from a tumor resistant to at least one anti-tumoral compound in order to immunize and generate in vitro an antibody, or one of its functional fragments, directed against a tumoral antigen specifically expressed at the surface of said resistant tumor and being possibly involved in the resistance of said resistant tumor. More particularly, the present invention is directed to such antibodies obtained by applying the method, such as the antibodies 1A6, 1A9, 2E11, 3C11 and 3G7, as well as to their use for treating cancer. | 2010-06-10 |
20100146651 | MEGANUCLEASE VARIANTS CLEAVING A DNA TARGET SEQUENCE FROM THE HPRT GENE AND USES THEREOF - An I-CreI variant or a single-chain derivative having at least one substitution in one of the two functional subdomains of the LAGLIDADG (SEQ ID NO: 153) core domain situated from positions 26 to 40 and 44 to 77 of I-CreI, and being able to cleave a DNA target sequence from the HPRT gene having a nucleotide sequence of SEQ ID NO: 1 to 14. Use of said variant for inducing a site-specific modification in the HPRT gene, for therapeutic (gene therapy of Lesch-Nyhan syndrome) or non-therapeutic purpose (engineering of transgenic animals and recombinant cell lines). | 2010-06-10 |
20100146652 | XENOBIOTIC RELATED INDUCTION OF GENE EXPRESSION - An isolated nucleic acid molecule comprising a nucleotide sequence encoding a transcriptional enhancer of cytochrome P450 (P450) CYP3A4 production or expression, and uses of the nucleic acid molecule for screening compounds for xenobiotic induction of CYP3A4 expression in cells and animals. | 2010-06-10 |
20100146653 | MACROPHAGE CELL-LINES FOR PROPAGATION OF PORCINE REPRODUCTIVE AND RESPIRATORY SYNDROME VIRUS - Particular aspects provide novel recombinant cells and cell lines (e.g., macrophage cell lines) that are permissive for propagation of porcine reproductive and respiratory syndrome virus (PRRSV) propagation in vitro or in vivo. In certain aspects, novel nucleic acid sequences encoding porcine sialoadhesin were transfected into existing macrophage cell-lines from other species, rendering them permissive to PRRSV infection, and suitable for propagation of PRRSV. Particular aspects provide exemplary recombinant cloned cell lines that support the replication of PRRSV, with an obtainable PRRSV titre of between 2×10 | 2010-06-10 |
20100146654 | UNACTIVATED OOCYTES AS CYTOPLAST RECIPIENTS FOR NUCLEAR TRANSFER - A method of reconstituting an animal embryo involves transferring a diploid nucleus into an oocyte which is arrested in the metaphase of the second meiotic division. The oocyte is not activated at the time of transfer, so that the donor nucleus is kept exposed to the recipient cytoplasm for a period of time. The diploid nucleus can be donated by a cell in either the GO or G1 phase of the cell cycle at the time of transfer. Subsequently, the reconstituted embryo is activated. Correct ploidy is maintained during activation, for example, by incubating the reconstituted embryo in the presence of a microtubule inhibitor such as nocodazole. The reconstituted embryo may then give rise to one or more live animal births. The invention is useful in the production of transgenic animals as well as non-transgenics of high genetic merit. | 2010-06-10 |
20100146655 | METHODS AND MATERIALS FOR PRODUCING TRANSGENIC ANIMALS - Transgenic artiodactyls are described as well as methods of making and using such artiodactyls. | 2010-06-10 |
20100146656 | Parthenocarpic Genetic Elements Derived From S. Habrochaites - The present invention relates to a method of producing a parthenocarpic, and optionally male sterile, tomato plant comprising introgressing into said plant a genetic region from Chromosome 4, 5 and/or 12 of | 2010-06-10 |
20100146657 | RESISTANCE TO GRAY LEAF SPOT IN MAIZE - The present invention is in the field of plant breeding and disease resistance. More specifically, the invention includes a method for breeding corn plants containing quantitative trait loci that are associated with resistance to gray leaf spot, a fungal disease associated with | 2010-06-10 |
20100146658 | MAIZE WITH ENHANCED TOLERANCE TO FUNGAL PATHOGEN - The present invention relates to the field of the improvement of the tolerance of maize to fungal pathogens and in particular to fusariosis by the qualitative and/or quantitative modification of the lignin biosynthesis pathway. | 2010-06-10 |
20100146659 | Plant Virus Designated Tomato Marchitez Virus - The invention relates to the field of virology. The invention provides an isolated plant virus named Tomato Marchitez virus (ToMarV), and components thereof. The invention further relates to methods of producing a ToMarV-resistant plant comprising the steps of identifying a ToMarV-resistant donor plant, crossing said ToMarV-resistant donor plant with a recipient plant, and selecting from an offspring plant a resistant plant. | 2010-06-10 |
20100146660 | PROCESS FOR MICROPROPAGATION OF POGOSTEMON CABLIN FROM A MERISTEMATIC EXPLANT - The present invention provides a commercially viable process for in vitro propagation of patchouli ( | 2010-06-10 |
20100140778 | PACKAGE, METHOD OF MANUFACTURING THE SAME AND USE THEREOF - The flexible package ( | 2010-06-10 |
20100140779 | Semiconductor Package with Semiconductor Core Structure and Method of Forming Same - A semiconductor device is made by providing a temporary carrier for supporting the semiconductor device. An integrated passive device (IPD) structure is formed over the temporary carrier. The IPD structure includes an inductor, resistor, and capacitor. Conductive posts are mounted to the IPD structure, and first semiconductor die is mounted to the IPD structure. A wafer molding compound is deposited over the conductive posts and the first semiconductor die. A core structure is mounted to the conductive posts over the first semiconductor die. The core structure includes a semiconductor material. Conductive through silicon vias (TSVs) are formed in the core structure. A redistribution layer (RDL) is formed over the core structure. A second semiconductor die is mounted over the semiconductor device. The second semiconductor die is electrically connected to the core structure. | 2010-06-10 |
20100140791 | INTEGRATED CIRCUIT PACKAGING STRUCTURE AND METHOD OF MAKING THE SAME - The invention provides an integrated circuit packaging and method of making the same. The integrated circuit packaging includes a substrate, a semiconductor die, a heat-dissipating module, and a protection layer. The substrate has an inner circuit formed on a first surface, and an outer circuit formed on a second surface and electrically connected to the inner circuit. The semiconductor die is mounted on the first surface of the substrate such that the plurality of bond pads contact the inner circuit. The heat-dissipating module includes a heat-conducting device, and the heat-conducting device, via a flat end surface thereof, contacts and bonds with a back surface of the semiconductor die. The protection layer contacts a portion of the first surface of the substrate and a portion of the heat-conducting device, such that the semiconductor die is encapsulated therebetween. | 2010-06-10 |
20100140793 | Process For Manufacturing Contact Elements For Probe Card Assembles - A process for making contact elements for a probe card assembly includes steps of forming a first continuous trench in a substrate along a first direction, and forming simultaneously a plurality of tip structures adjacent one to another in the first continuous trench in a second direction substantially normal to the first direction, each of the tip structures being part of, or adapted to be part of at least one corresponding contact element capable of forming an electrical contact with a terminal of an electronic device. | 2010-06-10 |
20100140794 | APPARATUS AND METHOD FOR PACKAGING CIRCUITS - An apparatus comprises an integrated circuit die including a main body having a top layer, a bottom layer, and a peripheral edge surface extending between the top layer and the bottom layer. The integrated circuit die also includes a bond pad on the main body, an edge contact at the peripheral edge surface and a line connecting the bond pad to the edge contact. The edge contact includes a bottom surface that substantially in the same plane as a surface of an encapsulant encasing the die. Additional apparatus, systems, and methods are disclosed. | 2010-06-10 |
20100140796 | Manufacturing method of semiconductor device, and semiconductor device - A manufacturing method of a semiconductor device includes a first to fourth steps. The first step includes a step of determining an UBM (Under Bump Metal) radius of an UBM of a chip. The second step includes a step of determining a first curvature radius of a solder bump formed on the UBM. The third step includes a step of determining a SRO (Solider Resist Opening) radius of a SRO of a substrate such that a ratio of the SRO radius to the UMB radius is in a range from 0.8 to 1.2. The fourth step includes a step of determining a second curvature radius of a spare solder formed on an electrode in the SRO such that the second curvature radius is equal to or more than the first curvature radius. | 2010-06-10 |