29th week of 2009 patent applcation highlights part 26 |
Patent application number | Title | Published |
20090183141 | Application program development assisting method, program, and information processing apparatus - A method, program, and information processing apparatus for detecting an inconsistency in an application program before the application program is implemented. The described is detecting a consistency or inconsistency in the design of screen transition of an application program, by generating a control flow graph for the application program, calculating from the control flow graph the solution of dataflow problem which occurs in the application program, detecting an inconsistency in the application program on the basis of the calculated solution, and displaying information concerning a detected inconsistency. | 2009-07-16 |
20090183142 | DEBUGGING LAZILY EVALUATED PROGRAM COMPONENTS - A system and method for facilitating debugging a computer program is provided. Mechanisms of the present invention facilitate presenting information and enable a developer to interact with a lazily evaluated program component. A debugging system may display data associated with a lazily evaluated program component, and may enable the programmer to control evaluation and viewing of elements of the lazily evaluated program component. In response to a user command, a debugging system may evaluate elements of the program component and display associated data. A user interface enables a user to view, interact with, and debug lazily evaluated program components as well as a program containing such components. | 2009-07-16 |
20090183143 | METHOD AND APPARATUS FOR GENERATING TEST CASES OF SOFTWARE SYSTEM - A method and an apparatus for generating test cases of a software system. The method includes the steps of: tracing a user request to acquire IT events related to each service and/or component invocation; forming IT transactions based on correlation information in IT events; correlating said IT transactions based on predetermined correlation rules, in order to form a business transaction; and extracting from the business transaction a business transaction pattern corresponding to said business transaction. The method further includes generating test cases of a software system based on the generated business transaction pattern. The apparatus includes hardware for accomplishing the foregoing method steps. | 2009-07-16 |
20090183144 | METHOD AND SYSTEM FOR PROVIDING A COMPONENTIZED RESOURCE ADAPTER ARCHITECTURE - A computer program product comprises a computer useable medium. The computer useable medium has a computer readable program such that when the computer readable medium is executed on a computer, the computer is caused to configure an adapter such that the adapter is specific to a data source, provides a communication link to the data source, converts a format of the data source to a format native to a middleware system, and converts a format of metadata of the data source to a standard metadata format. Further, the computer is caused to configure an application interface component to convert an invocation of a function in the middleware system to an invocation of a function provided by an Enterprise Information System through the adapter, convert the data format of the middleware system to a format native to the Enterprise Information System accessed through the adapter, and maintain metadata describing a message format and a function provided by the adapter. | 2009-07-16 |
20090183145 | TECHNIQUES FOR REDUCING DOWN TIME IN UPDATING APPLICATIONS WITH METADATA - A method and apparatus for reducing down time in updating applications with metadata is provided. The application contains both code and metadata. A copy of the application is made. A software update is installed on the copy of the application. During installation, the original application continues to run and service users, who may modify the metadata of the original application. Periodically, the metadata of the copy of the application is updated to incorporate changes to the metadata of the original application. When the software update is completed, users are prevented from further modifying the metadata of the original application. The metadata of the copy of the application is updated to incorporate the final changes to the metadata of the original application. Users are redirected from the original application to the copy of the application. | 2009-07-16 |
20090183146 | Specification, Abstraction, and Enforcement in a Data Center Operating System - An exemplary data center architecture includes a services abstraction, a data sources abstraction, an internal applications abstraction and a core administration abstraction for static and dynamic enforcement of data center polices based on compliance with a property set, a specification set or a property set and a specification set. Such an architecture can include a core administration abstraction with logic to install services and to upgrade services in a data center where a service must comply with the property set and the specification set prior to installation of the service or upgrade of the service in the data center. Various other devices, systems and methods are also described. | 2009-07-16 |
20090183147 | USER INTERFACE IMPROVEMENTS FOR MEDICAL DEVICES - A method and system is disclosed for operating a medical device with or without a cassette in place. A method is disclosed for adding additional VTBI to an ongoing infusion without stopping the infusion and with maintaining the infusion parameters. A method and system is disclosed for changing the CCA without having to interrupt or completely stop an ongoing infusion. Quick titration buttons are provided to allow improved navigation between various delivery display screens. | 2009-07-16 |
20090183148 | REMOTE INSTALLATION - A remote delivery system for delivering software is provided. The system includes a software receiving system; and a software delivery system operable to automatically deliver software to the receiving system. The software delivery system is operable to determine a delivery time, the delivery time being a function of timing information stored in the software delivery system. The software delivery system is operable to deliver the software at the delivery time, | 2009-07-16 |
20090183149 | DATA IMAGING SYSTEM AND METHODS - A method performed by a network device may include receiving index information from a second network device identifying an updated application, querying a third network device for the identified updated application, receiving the identified updated application from the third network device, storing the identified updated application received from the third network device and applying stored application user settings from memory to the stored updated application. | 2009-07-16 |
20090183150 | SYSTEM AND METHOD FOR SOFTWARE PRODUCT VERSIONING PACKAGING, DISTRIBUTION, AND PATCHING - A system and method for software product versioning, packaging, distribution, and patching. The system provides for convergence of registry models, adding critical information to a home registry and simplifying processing algorithms in the install framework. In accordance with an embodiment, a product alias element is added to a Product Provisioning model, referencing one or more products. This provides a loose coupling between the external market-oriented product name and version, and the internal product names and versions. The internal product names and versions are captured in the registry and used for all code-based decisions during installation and other provisioning related activities. In accordance with an embodiment, a Feature Model is also added to the Product Provisioning model, and modules are grouped under features. | 2009-07-16 |
20090183151 | Obtaining Software for a Handheld Device - Techniques for improved installation of software on handheld devices. In one embodiment, a handheld device is coupled with a computer that has a client software application. The client software application can support installing software applications onto the handheld device. The client software application can determine if the handheld device is in need of, or already has, one or more particular software applications installed on the handheld device. The client application software can then obtain the particular software applications from a remote server and then transfer the particular software applications to the handheld device. Advantageously, a user can automatically be made aware of the particular software applications that it may need. In one implementation, a user of the handheld device or the computer can purchase the particular software applications. | 2009-07-16 |
20090183152 | Method to Dynamically Provision Additional Computer Resources to Handle Peak Database Workloads - A method to handle peak database workloads is disclosed. In one form of the disclosure, the method can include requesting resources, receiving virtual-machine information in response to requesting, and allocating first and second portions of a workload according to the virtual-machine information. The method can also include processing the first portion on a virtual machine to generate a first result, processing the second portion on a cloned virtual machine to generate a second result, and aggregating the first and the second results to form a response. | 2009-07-16 |
20090183183 | System And Method For Flexible Device Driver Resource Allocation - A system and method for flexible device driver resource allocation is disclosed. In one embodiment, a method for allocating device driver resources in a data processing system includes statically allocating hardware resource pools to device drivers on a rigid basis during initialization of the data processing system, and dynamically altering the allocated hardware resource pools to the device drivers based on parameters associated with utilization of the allocated hardware resource pools during run-time. | 2009-07-16 |
20090183184 | DECLARATIVE INSTANCE BASED ACCESS CONTROL FOR APPLICATION RESOURCES WITH PERSISTED ATTRIBUTES AND STATE - Embodiments of the present invention provide a method, system and computer program product for declarative instance based access control for persistent application resources in a multi-tier application. In one embodiment of the invention, a method for instance based access control in a persistent application resource can be provided. The method can include creating one or more instances of an persistent application resource for a particular user or based on attributes of the user, coupling the instance(s) of the persistent application resource to a database implementing row-level access control, initializing access to the database according to a role or attribute for the particular user, and accessing a restricted set of data in the database through the instance(s) of the persistent application resource. | 2009-07-16 |
20090183185 | Declarative and Extensible Process Definition - An enterprise application may operate on a platform that is able to execute a solution pack that may have various configurable items incorporated into the solution pack. During runtime, the platform may present the configurable items in a user interface. The items may be embedded within the solution pack, which may contain various descriptors of a business process, including workflow definitions, data types handled in the process, and various rules or other definitions. The options made available within the solution pack may alter the workflow, alter conditions used within the workflow, change data types, or change any other element. The options may also be made available through an application programming interface to the platform. | 2009-07-16 |
20090183186 | METHODS AND SYSTEMS FOR PROVIDING, TO A FIRST APPLICATION EXECUTED BY A FIRST OPERATING SYSTEM, AN INTERFACE FOR COMMUNICATING WITH AT LEAST ONE APPLICATION EXECUTED BY A SECOND OPERATING SYSTEM - A method for providing, to a first application executed by a first operating system, an interface for communicating with at least one application executed by a second operating system includes providing, by a first interface object executed by the first operating system, a mechanism for external communication with a first application executed by the first operating system. A second interface object executed by the second operating system provides a mechanism for external communication with a window handler executed by the second operating system. The first interface object receives an identification of a window displayed by the first operating system and generated by a second application executed by the second operating system and requests, from the second interface object, analysis of the identified window. The first interface object receives, from the second interface object, an identification of contact information displayed by the window resulting from the analysis by the window handler. | 2009-07-16 |
20090183187 | Providing Command Line Interface Using a Remote Interface - A method and system to invoke business logic via a remote interface is described. The remote interface is used as a single point of entry to the business logic for both local and remote connectivity. | 2009-07-16 |
20090183188 | DISC RECORDING AND/OR REPRODUCING APPARATUS AND MIST ADSORBING METHOD OF THE DISC RECORDING AND/OR REPRODUCING APPARATUS - A disc recording and/or reproducing apparatus includes a disc mounting unit to which a disc recording medium is removably mounted, the disc mounting unit rotating the disc recording medium; a print head which discharges an ink drop towards a label surface of the disc recording medium that is rotationally driven by the disc mounting unit; and a mist attracting unit which, by applying a voltage, attracts mist of the ink drop discharged from the print head, the mist attracting unit provided near the disc recording medium mounted to the disc mounting unit. | 2009-07-16 |
20090183189 | SPINDLE MOTOR CONTROLLING METHOD AND OPTICAL DISK DRIVE USING THE SAME - An optical disk drive includes a spindle motor, a power source, a microprocessor, and a comparator. The spindle motor is for supporting a disk. The power source supplies a first voltage to drive the spindle motor to rotate. The microprocessor signals the power source to supply a second voltage to slow down rotational speed of the spindle motor when receiving a power-off signal. The comparator compares the rotational speed with a predetermined value. The microprocessor signals the power source to stop supplying power to the spindle motor when the rotational speed is smaller than the predetermined value. A controlling method for controlling the spindle motor in the optical disk driver is also provided. | 2009-07-16 |
20090183190 | LASER PROCESSING METHOD - In a laser processing method, a workpiece is set with respect to a jig having a laser passage hole and a relative position of the jig and the workpiece is determined so that the laser passage hole can face toward a target processing point on the workpiece. Then, laser light is irradiated on the target processing point through the laser passage hole while creating a stream of an inert gas flowing from a peripheral area of the target processing point toward the target processing point and flowing away from the workpiece through the laser passage hole. | 2009-07-16 |
20090183191 | SPINDLE MOTOR - A spindle motor is provided. The spindle motor includes a rotation shaft rotatably installed, a stator around the rotation shaft, a rotor coupled to the rotation shaft, a turntable rotated with the rotation shaft, and a center guide member comprising a body coupled to the rotation shaft and a support rim extending from the body, the support rim can comprise a first sloped surface extending from an outer surface of the body and making an angle of about 47° to 53° with an imaginary vertical line parallel with the rotation shaft, and a second sloped surface extending from an end of the first sloped surface and making an angle of about 16° to 22° with an imaginary vertical line parallel with the rotation shaft. | 2009-07-16 |
20090183192 | Locking structure for fixing the disk piece - A locking structure for fixing the disk piece, which comprises: a dish seat including a base portion and a plenty of flexible arms, and a pressing unit including a locking portion for locking the disk piece. Each flexible arm connects to the base portion, and protrudes outwardly from the base portion. The base portion has an adhesive face for sticking on any article or place. The pressing unit forms on the center of the dish seat, each flexible arm protrudes from the base portion and connects to the pressing unit. The locking structure of the present invention can be installed on any article or place, and fix the disk piece on the locking structure, so that the disk piece can be fixed on any place. Moreover, the locking structure of the present invention can be accessed easily and has a beautiful appearance. | 2009-07-16 |
20090183193 | GESTURE CATALOGING AND RECOGNITION - Methods and apparatus for cataloging and recognizing gestures are disclosed. A gesture may be detected using sample motion data. An energy value and a baseline value may be computed. The baseline value may be updated if the energy value is below a calm energy threshold. The sample motion data may be adjusted based on the updated baseline value. A local variance may be calculated over a predetermined number of samples. Sample motion data values may be recorded if the local variance exceeds a threshold. Sample motion data recording may stop if a local variance scalar value falls below a drop threshold. Input Gestures may be recognized by computing a total variance for sample values in an Input Gesture; calculating a figure of merit using sample values from the Input Gesture and one or more Catalog Gestures; and determining whether the Input Gesture matches a Catalog Gesture from the figure of merit. | 2009-07-16 |
20090183194 | METHODS AND APPARATUS TO HANDLE TELECOMMUNICATION SERVICE CHANGES - Methods and apparatus for handling telecommunication service changes are described. An example apparatus includes a service indicator receiver to receive a first service indicator for a first service and to receive a second service indicator different from the first service indicator for a second service, a converter to convert the first service indicator into a first set of service rules for the first service, to convert the second service indicator into a second set of service rules for the second service, and a rule transmitter to send the first set of service rules and the second set of service rules to a network element. | 2009-07-16 |
20090183195 | Regulatory Environment Adaptation Layer for Content Protection - Aspects of the invention provide apparatuses, computer media, and methods for supporting post-delivery content protection systems, which are used to protect the content of free-to-air (FTA) or clear-to-air (CTA) digital broadcasts after reception against unauthorized use such as Internet redistribution. A receiver circuit of a receiver device obtains a broadcast stream, which contains usage restriction signaling and content. A regulatory determination circuit obtains regulations for the distribution of the content from a regulation database system based on an apparatus parameter such as the country that the receiver device is located. The regulatory determination circuit further obtains the usage state of the content from the regulations and usage restriction signaling by mapping each signaling state to a usage state. The content at the acquisition point is protected in accordance with the usage state. | 2009-07-16 |
20090183196 | METHODS AND APPARATUS TO REDUCE CHANNEL SWITCHING TIME - Methods and apparatus to reduce channel switching time. A method for channel switching includes bundling entitlement control messages (ECMs) to generate bundled ECMs that comprise decryption keys associated with a first content channel and one or more additional content channels, respectively, and transmitting the bundled ECMs with the first content channel. An apparatus for channel switching includes key acquisition logic configured to receive bundled ECMs that comprise decryption keys associated with a first content channel and one or more additional content channels, respectively, processing logic configured to receive a request to render a second content channel that is part of the one or more additional content channels, and decryption logic configured to utilize a selected decryption key obtained from the bundled ECMs to decrypt the second content channel. | 2009-07-16 |
20090183197 | METHOD OF SPLICING ENCODED MULTIMEDIA DATA STREAMS - The present invention provides a method of splicing data streams flowing between an encoder and a decoder. The method includes accessing a first encoded data stream. The first encoded data stream is encoded by the encoder based upon a first buffer size associated with the decoder. The method also includes delaying the first encoded data stream by an offset determined based on a second buffer size associated with the decoder. The second buffer size is larger than the first buffer size. The method further includes splicing one or more second encoded data stream(s) into the delayed first encoded data stream. | 2009-07-16 |
20090183198 | METHOD OF CONTENT SUBSTITUTION - A method of substituting a primary content ( | 2009-07-16 |
20090183199 | Devices, Systems, and Methods Regarding Advertisement on Demand - Certain exemplary embodiments can provide a method, which can comprise, responsive to a signal from a television control device, causing a display of a video advertisement. The video advertisement can interrupt the video broadcast. The signal can be adapted to cause a detection of a determined frame of a video broadcast interrupted by the display of the video advertisement. | 2009-07-16 |
20090183200 | AUGMENTING CLIENT-SERVER ARCHITECTURES AND METHODS WITH PERSONAL COMPUTERS TO SUPPORT MEDIA APPLICATIONS - Systems and methods according to exemplary embodiments provide systems and methods for augmenting the capabilities of a client device. The client device can be augmented by a device which has additional processing and memory capability to perform additional functions such as, for example, the translation of desired media into a format usable by the client device. | 2009-07-16 |
20090183201 | INTERACTIVE LEARNING - A method may include providing a live, interactive program or information associated with the live, interactive program on a video display device; and providing a live interactive content icon on the video display device when a current time is before an end time of the live, interactive program, the live interactive content icon indicating that live interactive content is available for the live, interactive program. | 2009-07-16 |
20090183202 | METHOD AND APPARATUS TO DISPLAY PROGRAM INFORMATION - A method of displaying program information includes generating at least one representative video by extracting a part from video data of content, extracting at least one piece of additional information from the content, and generating the program information by assembling the generated at least one representative video and the extracted at least one piece of additional information. By using the method, moving picture program information is provided instead of table type program information. Accordingly, a user conveniently selects a desired content, while enjoying a moving picture, compared to a conventional of directly selecting the desired content based on the table type program information. | 2009-07-16 |
20090183223 | VIDEO DISTRIBUTION SYSTEM, VIDEO-RECORDING AND DISTRIBUTION APPARATUS, AND RECEIVER - When carrying out reception and video-recording of a plurality of programs, a stream receiving unit ( | 2009-07-16 |
20090183224 | SYSTEM FOR SELECTING A VIDEO OR AUDIO PATH - A communication system where an input port on a transmitter or receiver is configured to receive input data that is either audio data or video data. A processor in the transmitter or the receiver is configured to detect if the input data is either audio data or video data. The processor selects an audio path if the input data is audio data. If the input data is video data, the processor selects a video path. The selected audio path or video path sends audio output data or video output data to an output port. The output port is configured to send the audio output data or video output data. | 2009-07-16 |
20090183225 | PLUGGABLE MODULES FOR TERMINAL SERVICES - Embodiments that facilitate the use of pluggable policy modules and authentication modules for access to a Terminal Services (TS) server are disclosed. In accordance with various embodiments, a method includes accessing one or more pluggable modules at a Terminal Services Gateway (TSG) server or a Terminal Services (TS) server. The method further includes processing a TS server access request from a TS client at the TSG server or the TS server. The TS server access request is processed in part based on the one or more pluggable modules. In one particular embodiment, the one or more pluggable modules include at least one of a connection authorization policy (CAP) module, a resource authorization policy (RAP) module, and an authentication module. | 2009-07-16 |
20090183226 | Systems and Methods for Identity-Based Communication Gate for Social Networks - Systems and methods are disclosed that provide for control of online communication services, including social networks and video games. In some embodiments, parents of children engaging in activities using online communication services can control who their child can engage in communications with, while using online communication services. In some embodiments, parents can monitor potentially problematic communications between their child and other subscribers of an online communication service. Thus, subscribers of online communication services can be prevented from misrepresenting themselves or concealing important information, including age and gender. | 2009-07-16 |
20090183227 | Secure Runtime Execution of Web Script Content on a Client - Method for ensuring security of online content on a client device. Online content is rendered on a display on the client device and the client device stores one or more policies each defining an execution boundary of a web script content. The execution boundary defines resource access of the web script content, and the web script content is configured to issue an execution invocation to interact with other portions of the online content. The issued execution invocation is intercepted and parameters included in the intercepted execution invocation are identified. The identified parameters request resources from an application or the client device for interacting with the other portions of the online content. The identified parameters are evaluated against the execution boundary of each of the policies stored in the client device. A dynamic resolution is provided to the web script content in response to the evaluating. | 2009-07-16 |
20090183228 | Method for managing usage authorizations in a data processing network and a data processing network - To facilitate the work of a user with a data processing network with a number of security levels of the applications and functions to be executed, a method is proposed for managing usage authorizations in this data processing network. In at least one embodiment of the method, when a user logs in at a work station, at least one role stored in a central authorization register is allocated to the user; when an application is called up a local security module of the application determines which authorizations are granted for the role of the user; and if there is no authorization for an application-related action, a central security module accesses a central collection of security rules, the security rules indicating the circumstances, in which, when a user's authorizations are not sufficient to carry out the application-related action, the user can still carry it out and determines whether according to at least one of the security rules a usage authority is possible for the application-related action and offers this to the user. | 2009-07-16 |
20090183229 | License Authentication Device and License Authentication Method - A user-specific information is generated from unique information of an external device. A determination is made as to whether an entered license key has been generated based on the user-specific information. As a result of the determination, if the license key has been generated based on the user-specific information, the entered license key is authenticated as a correct license key. | 2009-07-16 |
20090183230 | SYSTEMS AND METHODS FOR SERVER AIDED PROCESSING OF A SIGNED RECEIPT - A method for processing security communication protocol compliant signed receipts at a mobile communication device linked to a host system is provided. The host system receives an email message linked to a digital signature, and a signed receipt. The host system redirects the signed receipt to the mobile communication device. The host system determines if the email message is available at the mobile communication device, and if not, the host system retrieves the email message and redirects the email message to the mobile communication device. The mobile communication device can then verify the signed receipt based on the email message. Optionally, rather than the email message, the host system retrieves and/or recalculates data elements associated with the email message and required to verify the signed receipt, and redirects these data elements to the mobile communication device. A related system is provided, as well as server computer program for the host system, and device computer program for the mobile communication device. | 2009-07-16 |
20090183231 | USER TERMINAL WITH SECURITY FUNCTION AND SECURITY-CONTROL METHOD - A user terminal apparatus with a security function and a security-control method are provided, which may prevent unauthorized use of the user terminal apparatus without requiring a user to lock up the user terminal apparatus. The user terminal apparatus includes an input sensing unit which senses a user's input to the user terminal apparatus, an information collecting unit which collects information regarding an input state, which is determined based on the user's input, and a transition of the determined state, and a security-control unit which determines whether the user is valid based on the collected information and controls a security function. | 2009-07-16 |
20090183232 | Data processing network and method for operating a data processing network - During operation of a data processing network, including a number of individual devices enabling user access, an identification object that can be carried by a user of the data processing network exchanges data in a wireless fashion with an access control device connected to an individual device, as soon as the identification object is sufficiently close to the access control device. In at least one embodiment, the user is allowed access to the data processing network as a function of data stored on the identification object and transmitted to the individual device. If a second identification object approaches the access control device, the different identification objects are assigned different usage rights as a function of the time that has elapsed between the detection of the identification objects by the access control device. | 2009-07-16 |
20090183243 | USER AUTHORIZATION SYSTEM AND METHODS - A slot management system including a download and configuration server-based sub-system and method is disclosed for use with game devices, systems, and methods is provided to enable users to monitor, control, and modify game devices and other related activities. A computerized authorization system authorizes users access to the slot management system. | 2009-07-16 |
20090183244 | AUTOMATION TOOL FOR PROVIDING USERS WITH SECURITY ACCESS TO AN ELECTRONIC SYSTEM - A method for providing multiple users with security access to an electronic system is provided. The method comprising: providing a plurality of parent security roles, wherein each parent security role includes a plurality of transactions authorized to be performed in the electronic system, providing a plurality of child security roles, wherein each child security role is derived from one of the plurality of parent security roles, setting up the multiple users in the electronic system and their associated user passwords, assigning one of the plurality of child security roles to each of the multiple users to provide the multiple users with security access to the electronic system at once, and providing each of the multiple users with security access to the electronic system, via the associated user password, in accordance with the child security role assigned to the user. | 2009-07-16 |
20090183245 | Limited Functionality Mode for Secure, Remote, Decoupled Computer Ownership - In one embodiment, a computer system comprises one or more components and a secure computing environment coupled to the components. The secure computing environment is configured to program at least one of the components to enter a limited functionality mode responsive to expiration of a use right to the computer system, wherein operation of the computer system in the limited functionality mode is reduced compared to operation when the use right has not expired. The secure computing environment is configured to monitor the components in the limited functionality mode to detect that a limited functionality mode configuration has been modified by an unauthorized entity and to cause the computer system to enter a second mode in which operation of the computer system is reduced compared to operation in the limited functionality mode in response. In another embodiment, the secure computing environment detects a non-temporal event that indicates a violation of an owner-imposed restriction and enters a limited functionality mode. | 2009-07-16 |
20090183246 | Universal multi-factor authentication - An authentication system includes logic to receive and identify authentication requests from a plurality of service providers, each including a one time code. Unique ids are identified for users corresponding to each of the one time codes. The unique ids are applied to generate one time codes to compare with the one time codes received from the service providers. Authentication results are communicated to the service providers. | 2009-07-16 |
20090183247 | SYSTEM AND METHOD FOR BIOMETRIC BASED NETWORK SECURITY - Systems and methods of securing access to a network are described. Access to the network is secured using multifactor authentication, biometrics, strong encryption, and a variety of wireless networking standards. Biometrics include fingerprints, facial recognition, retinal scan, voice recognition and biometrics can are used in combination with other authentication factors to create a multi-factor authentication scheme for highly secure network access. Requests that require access to secured network resources may be intercepted and a captive portal page returned to challenge a user. Biometric information returned in response to the portal page is used to authenticate the user and determine access rights to the network. | 2009-07-16 |
20090183248 | TWO-WAY ERROR CORRECTION FOR PHYSICAL TOKENS - The invention relates to a method of establishing a shared secret between two or more parties, based on a physical token, wherein helper data from both the enrolment and the authentication measurement is used in such a way that only response data reliable at both measurements is used to generate the shared secret. The generated shared secret is therefore identical to both parties to a high degree of certainty. The invention further relates to a system for generating such a shared secret, comprising a central database server and a terminal, or any one of them. | 2009-07-16 |
20090183249 | TRUSTED STORAGE AND DISPLAY - A storage token has a display and a keyboard, or other input device, that allows a user to view a request to access a memory location and enter a response to the request. The display allows presentation of details of the request, such as a pathname to a requested memory location, metadata describing a cryptographic key for use in a transaction confirmation, and/or transaction details which are awaiting verification by a credential stored on the token. The storage token may also include a cryptographic engine and a secure memory allowing signing data returned in response to the request. | 2009-07-16 |
20090183250 | APPARATUS, SYSTEM, AND METHOD FOR TRANSFERRING AUTHORITY - In a system for transferring authority, a transfer token providing unit provides a transfer token to transfer a token of a first user to a third party based on a request from a first terminal. A releasing unit releases the transfer token provided by the transfer token providing unit. A utilizing transfer token providing unit provides, when a request to obtain the transfer token released by the releasing unit is received from a second terminal, a utilizing transfer token to make the requested transfer token available to a second user, and provides the utilizing transfer token to the second user. | 2009-07-16 |
20090183251 | INTEGRATED INFORMATION MANAGEMENT SYSTEM AND METHOD - Embodiments of present invention provide for an integrated information management system. The system comprises a set of predetermined applications related to managing information of a government program. The system also comprises a web portal that renders a set of web pages as a virtual workspace. The web portal interoperates with the set of predetermined applications using a plurality of portlets. At least one of the plurality of portlets implementing an application of the set of predetermined applications that is external to the web portal and at least one of the plurality portlets implementing an application of the set of predetermined applications that is local to the web portal. | 2009-07-16 |
20090183252 | PACKET RELAY APPARATUS - A packet relay apparatus keeps only packets specified as authentication target packets of MAC address authentication, to reduce the number of packets to be transferred from H/W to a CPU. In addition to a source MAC address, the authentication target packet of MAC address authentication is specified by an Ethernet type, a destination IP address, a protocol, a source port number and a destination port number of TCP/UDP, and the like. In this way, the packet relay apparatus excludes a terminal not transmitting authentication target packets of MAC address authentication, from the MAC address authentication target, while allowing selection from other authentication methods such as Web authentication and IEEE802.1X authentication. | 2009-07-16 |
20090183263 | SIMULTANEOUS TAMPER-PROOFING AND ANTI-PIRACY PROTECTION OF SOFTWARE - Simultaneous tamper-proofing and anti-piracy protection of software is provided by splitting applications into two parts: an application, and an application launcher. The application is subject to the tamper-proofing protections deployed by a networked service, while the application launcher is subject to anti-piracy protections. To ensure that the application benefits from the anti-piracy protection of the application launcher, the application and application launcher share a trusted challenge-response relationship. The application includes a challenger library for issuing challenges to the application launcher, and the application launcher includes a responder library for responding to such challenges. | 2009-07-16 |
20090183264 | SYSTEM AND METHOD FOR PROTECTING CONTENT IN A WIRELESS NETWORK - A method of providing access to content within a user device is disclosed and may include determining a location of the content, determining whether the content is within an allowed region, and selectively prompting a user to purchase a license to access the content. In a particular aspect, the user may be prompted to purchase the license to the access the content when the content is not within an allowed region. If the license is purchased, the user may be allowed to access the content. The license may be an unlimited license, a limited license, or a transfer license. | 2009-07-16 |
20090183265 | IDENTIFICATION OF POTENTIAL UNAUTHORIZED DISTRIBUTION OF COPYRIGHTED INFORMATION - A computer-implemented method is provided of identifying potential unauthorized distribution of copyrighted information. The copyrighted information includes copyrighted items and copyright filing information for each of the copyrighted items. A database file is provided of the copyrighted information. Also, a source of items is provided from an entity other than the copyright owner which contains items that are potentially in violation of the copyrighted items. An automatic comparison is made. The copyrighted items in the database file of copyrighted information are automatically compared in a computer with the items in the source of items. The comparison identifies any items in the source of items that are potentially in violation of a copyrighted item due to similarities with the copyrighted items. The identified items are displayed in association with the copyrighted items that are potentially being violated and the copyright filing information of the copyrighted items that are potentially being violated. | 2009-07-16 |
20090183266 | METHOD AND A SYSTEM FOR RECOVERING A LOST OR STOLEN ELECTRONIC DEVICE - A method and system for recovering a lost or stolen electronic device is provided. The method includes determining trace information to trace a present user of the electronic device, and obtaining an authentication information to determine whether or not the present user of the electronic device is a valid user of the electronic device. The method further includes sending the trace information to another user who had been previously determined to be the valid user of the electronic device, if it is determined that the present user is not the valid user of the electronic device. | 2009-07-16 |
20090183267 | MOUSE MODELS CARRYING A KNOCK-OUT MUTATION OF THE QPCT-GENE - The present invention provides a knock-out non-human animal, in particular a mouse carrying a Qpct knock-out mutation. The present invention additionally provides the respective cells and cell lines and methods and compositions for evaluating agents that affect Qpct, for use in compositions for the treatment of Qpct-related diseases. | 2009-07-16 |
20090183268 | METHODS AND SYSTEMS FOR MEDICAL SEQUENCING ANALYSIS - Disclosed are methods of identifying elements associated with a trait, such as a disease. The methods can comprise, for example, identifying the association of a relevant element (such as a genetic variant) with a relevant component phenotype (such as a disease symptom) of the trait, wherein the association of the relevant element with the relevant component phenotype identifies the relevant element as an element associated with the trait, wherein the relevant component phenotype is a component phenotype having a threshold value of severity, age of onset, specificity to the trait or disease, or a combination, wherein the relevant element is an element having a threshold value of importance of the element to homeostasis relevant to the trait, intensity of the perturbation of the element, duration of the effect of the element, or a combination. The disclosed methods are based on a model of how elements affect complex diseases. The disclosed model is based on the existence of significant genetic and environmental heterogeneity in complex diseases. Thus, the specific combinations of genetic and environmental elements that cause disease vary widely among the affected individuals in a cohort. The disclosed model is an effective, general experimental design and analysis approach for the identification of causal variants in common, complex diseases by medical sequencing. The disclosed model and the disclosed methods based on the model can be used to generate valuable and useful information. | 2009-07-16 |
20090183269 | GENE EXPRESSION SYSTEM USING ALTERNATIVE SPLICING IN INSECTS - A polynucleotide expression system is provided that is capable of alternative splicing of RNA transcripts of a polynucleotide sequence to be expressed in an organism. | 2009-07-16 |
20090183270 | Transgenic plants with enhanced agronomic traits - This invention provides transgenic plant cells with recombinant DNA for expression of proteins that are useful for imparting enhanced agronomic trait(s) to transgenic crop plants. This invention also provides transgenic plants and progeny seed comprising the transgenic plant cells where the plants are selected for having an enhanced trait selected from the group of traits consisting of enhanced water use efficiency, enhanced cold tolerance, increased yield, enhanced nitrogen use efficiency, enhanced seed protein and enhanced seed oil. Also disclosed are methods for manufacturing transgenic seed and plants with enhanced traits. | 2009-07-16 |
20090183271 | Guzmania hybrid named 'Rock' - A new and distinct | 2009-07-16 |
20090183272 | NUCLEOTIDE SEQEUNCES MEDIATING MALE FERTILITY AND METHOD OF USING SAME - Nucleotide sequences mediating male fertility in plants are described, with DNA molecule and amino acid sequences set forth. Promoter sequences and their essential regions are also identified. The nucleotide sequences are useful in mediating male fertility in plants. | 2009-07-16 |
20090183273 | NUCLEOTIDE SEQUENCES MEDIATING MALE FERTILITY AND METHOD OF USING SAME - Nucleotide sequences mediating male fertility in plants are described, with DNA molecule and amino acid sequences set forth. Promoter sequences and their essential regions are also identified. The nucleotide sequences are useful in mediating male fertility in plants. | 2009-07-16 |
20090183274 | NUCLEOTIDE SEQUENCES MEDIATING MALE FERTILITY AND METHOD OF USING SAME - Nucleotide sequences mediating male fertility in plants are described, with DNA molecule and amino acid sequences set forth. Promoter sequences and their essential regions are also identified. The nucleotide sequences are useful in mediating male fertility in plants. | 2009-07-16 |
20090183275 | NUCLEOTIDE SEQEUNCES MEDIATING MALE FERTILITY AND METHOD OF USING SAME - Nucleotide sequences mediating male fertility in plants are described, with DNA molecule and amino acid sequences set forth. Promoter sequences and their essential regions are also identified. The nucleotide sequences are useful in mediating male fertility in plants. | 2009-07-16 |
20090183276 | Novel Bacillus Thuringiensis Gene with Coleopteran Activity - The invention provides nucleic acids, and variants and fragments thereof, obtained from strains of | 2009-07-16 |
20090183277 | Novel Bacillus Thuringiensis Gene with Coleopteran Activity - The invention provides nucleic acids, and variants and fragments thereof, obtained from strains of | 2009-07-16 |
20090183278 | Novel Bacillus Thuringiensis Gene with Coleopteran Activity - The invention provides nucleic acids, and variants and fragments thereof, obtained from strains of | 2009-07-16 |
20090183279 | Novel Bacillus Thuringiensis Gene with Coleopteran Activity - The invention provides nucleic acids, and variants and fragments thereof, obtained from strains of | 2009-07-16 |
20090183280 | Transgenic Plants Modified for Reduced Cadmium Transport, Derivative Products, and Related Methods - Various embodiments are directed to transgenic plants, including transgenic tobacco plants and derivative seeds, genetically modified to impede the transport of Cadmium (Cd) from the root system to aerial portions of transgenic plants by reducing the expression levels of HMA-related transporters. Various embodiments are directed to transgenic tobacco plants genetically modified to stably express a RNAi construct encoding RNAi polynucleotides that enable the degradation of endogenous NtHMA RNA variants. Reduced expression of NtHMA transporters in transgenic plants results in substantially reduced content of Cadmium (Cd) in the leaf lamina. Various consumable products that are substantially free or substantially reduced in Cd content can be produced by incorporating leaves derived from transgenic tobacco plants modified to reduce the expression of NtHMA transporters. | 2009-07-16 |
20090183281 | Use of histone chaperone activity of agrobacterium 6b protein - The present invention provides a technology for modifying the gene expression of a plant body in combination with using histone-chaperon-activity of protein 6b. According to the invention, gene expression is changed or modified globally. | 2009-07-16 |
20090183282 | Insecticidal compounds and methods for selection thereof - A series of potent and highly specific insecticidal toxins characterized by an amino acid sequences SEQ ID NO: 2-35. | 2009-07-16 |
20090183283 | RICE PROMOTERS FOR REGULATION OF PLANT EXPRESSION - The present invention provides promoters from plants capable of driving gene expression in plant cells. The promoters vary in strength and in tissue specificity, and can be used to facilitate the development of transgenic plants in which tissue preferred expression, constitutive expression, and the strength of transgene expression is either more or less critical. | 2009-07-16 |
20090183284 | NUCLEOTIDE SEQEUNCES MEDIATING MALE FERTILITY AND METHOD OF USING SAME - Nucleotide sequences mediating male fertility in plants are described, with DNA molecule and amino acid sequences set forth. Promoter sequences and their essential regions are also identified. The nucleotide sequences are useful in mediating male fertility in plants. In one such method, the homozygous recessive condition of male sterility causing alleles is maintained after crossing with a second plant, where the second plant contains a restoring transgene construct having a nucleotide sequence which reverses the homozygous condition. The restoring sequence is linked with a hemizygous sequence encoding a product inhibiting formation or function of male gametes. The maintainer plant produces only viable male gametes which do not contain the restoring transgene construct. Increase of the maintainer plant is also provided by self-fertilization, and selection for seed or plants which contain the construct. | 2009-07-16 |
20090183285 | Novel Bacillus Thuringiensis Gene with Coleopteran Activity - The invention provides nucleic acids, and variants and fragments thereof, obtained from strains of | 2009-07-16 |
20090183286 | PROMOTER MOLECULES FOR USE IN PLANTS - The present invention provides nucleic acid molecules isolated from | 2009-07-16 |
20090183287 | Raspberry named 'Nantahala' - Linnaeus ‘Nantahala’ is a new and distinct variety of raspberry that has the following unique combination of desirable features that are outstanding in a new variety.
| 2009-07-16 |
20090183288 | Nematode resistant grape rootstock '9365-85' - Rootstock ‘9365-85’ is a cross of L514-10 ( | 2009-07-16 |
20090183289 | Hibiscus plant named Alma's Star - A new and distinct cultivar of | 2009-07-16 |