30th week of 2010 patent applcation highlights part 61 |
Patent application number | Title | Published |
20100192146 | DEPLOYMENT OF REMOTE PORTLETS INTO A PORTAL - A method and system for deploying remote portlet applications into a portal. The system includes a portal server in communication with a client, and including a portal which includes a portlet which receives a request from a user, via the client, to install a portlet application from a remote location, searches for a selected remote portlet application as selected by the user, and triggers an installation of the selected remote portlet application when selected for installation by the user, and a deployment application programming interface (API) which communicates with the portlet and deploys the selected remote portlet application to the portal when triggered by the portlet. | 2010-07-29 |
20100192147 | METHOD OF INSTALLING SOFTWARE, PROGRAM, AND INFORMATION PROCESSING APPARATUS - In an information processing apparatus, when an installation execution instruction is input, a package which is instructed by the execution instruction, and packages which are in a dependence relationship with the package are set as an install items. For each of the packages, a license text indicated by text data in the package is set as a display text for a license dialog. A group of packages having the same license which is to be concluded is detected by comparing display texts which are set in packages, with one another, and, for each group of packages having the same license, a license dialog in which the common display text is described is displayed. In this case, the user is inquired about the intention of agreement conclusion while identification information of packages corresponding to the license is described together with the license which is the display text, in the dialog. | 2010-07-29 |
20100192148 | USER DEFINED DATA PARTITIONING (UDP) - GROUPING OF DATA BASED ON COMPUTATION MODEL - Methods, systems, and computer program products are provided for generating application-aware data partitioning to support parallel computing. A label for a user defined data partitioning (UDP) key is generated by a labeling process to configure data partitions of original data. The UDP is labeled by the labeling process to include at least one key property excluded from the original data. The data partitions are evenly distributed to co-locate and balance the data partitions and corresponding computations performed by computational servers. A data record of the data partitions is retrieved by performing an all-node parallel search of the computational servers using the UDP key. | 2010-07-29 |
20100192149 | POWER MANAGER FOR VIRTUAL MACHINES - A virtual power manager provides for, when plural virtual machines are running, accessing these virtual machines to determine their respective virtual-machine power settings and determining hardware power settings at least in part as an aggregate function of the virtual-machine power settings. | 2010-07-29 |
20100192150 | EXCLUSIVE ACCESS FOR SECURE AUDIO PROGRAM - Executing a monitor on a platform, the monitor capable of providing exclusive, secure access to an audio I/O device of the platform, executing a first partition on the platform, providing an audio device model in the first partition by directly mapping the audio I/O device from the monitor to the first partition for applications executing in the first partition, and providing exclusive, secure access to the audio I/O device to a program performing an audio function in a secure mode in the first partition. | 2010-07-29 |
20100192151 | Method for arranging schedules and computer using the same - A method for arranging schedules and a computer using the method are disclosed. The method comprises the steps of: recording a user behavior record in a predetermined time interval; filtering the user behavior record to generate an effective user behavior record; and generating a schedule according to the effective user behavior record. | 2010-07-29 |
20100192152 | INFORMATION PROCESSING DEVICE, INFORMATION PROCESSING METHOD, AND RECORDING MEDIUM - An information processing device which has a plurality of process units for performing various kinds of processes includes a detecting unit that detects a processing loads of the process units; a determining unit that determines whether a total amount of the processing loads detected by the detecting unit is equal to or larger than a specific value; a designating unit that designates a process unit having a process state to be controlled, based on the processing loads of the process units detected by the detecting unit, when the determining unit determines that the total amount is equal to or larger than the specific value; a process identifying unit that identifies a process having an execution state to be controlled among processes being performed by the process unit designated by the designating unit; and a control unit that controls the execution state of the process identified by the process identifying unit. | 2010-07-29 |
20100192153 | SELECTING EXECUTING REQUESTS TO PREEMPT - Requests that are executing when an application is determined to be in an overload condition are preempted. To select the executing requests to preempt, a value for each executing request is determined. Then, executing requests are selected for preemption based on the values. | 2010-07-29 |
20100192154 | SEPARATION KERNEL WITH MEMORY ALLOCATION, REMOTE PROCEDURE CALL AND EXCEPTION HANDLING MECHANISMS - A computer-implemented system ( | 2010-07-29 |
20100192155 | SCHEDULING FOR PARALLEL PROCESSING OF REGIONALLY-CONSTRAINED PLACEMENT PROBLEM - Scheduling of parallel processing for regionally-constrained object placement selects between different balancing schemes. For a small number of movebounds, computations are assigned by balancing the placeable objects. For a small number of objects per movebound, computations are assigned by balancing the movebounds. If there are large numbers of movebounds and objects per movebound, both objects and movebounds are balanced amongst the processors. For object balancing, movebounds are assigned to a processor until an amortized number of objects for the processor exceeds a first limit above an ideal number, or the next movebound would raise the amortized number of objects above a second, greater limit. For object and movebound balancing, movebounds are sorted into descending order, then assigned in the descending order to host processors in successive rounds while reversing the processor order after each round. The invention provides a schedule in polynomial-time while retaining high quality of results. | 2010-07-29 |
20100192156 | TECHNIQUE FOR CONSERVING SOFTWARE APPLICATION RESOURCES - Systems and methods of adjusting allocated hardware resources to support a running software application are disclosed. A system includes adjustment logic to adjust an allocation of a first hardware resource to support a running software application. Measurement logic measures at least one hardware resource metric associated with the first hardware resource. Service level logic calculates an application service level based on the measured at least one hardware resource metric. When the first application service level satisfies a threshold application service level, the allocation of the first hardware resource is iteratively reduced to reach a reduced allocation level where the application service level does not satisfy the threshold application service level. In response thereto, the allocation of the first hardware resource is increased by an increment, such that the application service level again satisfies the threshold application service level. | 2010-07-29 |
20100192157 | On-Demand Compute Environment - An on-demand compute environment comprises a plurality of nodes within an on-demand compute environment available for provisioning and a slave management module operating on a dedicated node within the on-demand compute environment, wherein upon instructions from a master management module at a local compute environment, the slave management module modifies at least one node of the plurality of nodes. | 2010-07-29 |
20100192158 | Modeling Computer System Throughput - A method of determining an estimated data throughput capacity for a computer system includes the steps of creating a first model of data throughput of a central processing subsystem in the computer system as a function of latency of a memory subsystem of the computer system; creating a second model of the latency in the memory subsystem as a function of bandwidth demand of the memory subsystem; and finding a point of intersection of the first and second models. The point of intersection corresponds to a possible operating point for said computer system. | 2010-07-29 |
20100192159 | SEPARATION KERNEL WITH MEMORY ALLOCATION, REMOTE PROCEDURE CALL AND EXCEPTION HANDLING MECHANISMS - A computer-implemented system ( | 2010-07-29 |
20100192160 | System, Device, and Method for Interprocessor Communication in a Computer System - A system, device, and method for interprocessor communication in a computer system utilizes a special Message Passing Service (MPS) to provide interprocessor communications. The MPS enables a client application running on one processor in a computer to communicate with a target application running a different processor in the same or a different computer. In order for the client application to communicate with the target application, the client application establishes a session to the target application over an existing communication link using the MPS. The MPS provides for both synchronous and asynchronous communication services. When the client application establishes the session to the target application, the client application specifies, among other things, a “callback” routine. The MPS invokes the “callback” routine to report certain asynchronous events to the client application. The MPS blocks the client application during certain synchronous operations so that the client application does not proceed until the synchronous operation is completed. | 2010-07-29 |
20100192161 | Lock Free Queue - A first in, first out queue uses a sequence of arrays to store elements in the queue. The arrays are constructed using a lock free queue, and within each array, a lock free mechanism may be used to enqueue and dequeue elements. Many embodiments may use atomic operations to ensure successful placement of elements in the queue, as well as remove elements from the queue. The atomic operations may be used within a loop until successful. | 2010-07-29 |
20100192162 | METHOD AND APPARATUS FOR PROVIDING CALENDAR CONFLICT WARNINGS - In one embodiment, a method includes obtaining a transmission sent by a first application and determining whether the transmission includes date/time information. If it is determined that the transmission includes date/time information, the date/time information is compared to information associated with at least a second application. A determination is made as to whether the date/time information conflicts with the information associated with the second application, and if it is determined that the date/time information conflicts with the information associated with the second application, a conflict warning is provided. | 2010-07-29 |
20100192163 | INTERRUPT MANAGEMENT FOR MULTIPLE EVENT QUEUES - Method of managing interaction between a host subsystem and a peripheral device. Roughly described, the peripheral device writes an event into an individual event queue, and in conjunction therewith, also writes a wakeup event into an intermediary event queue. The wakeup event identifies the individual event queue. The host subsystem, in response to retrieval of the wakeup event from the intermediary event queue, activates an individual event handler to consume events from the individual event queue. | 2010-07-29 |
20100192164 | METHOD FOR THE TRANSPARENT REPLICATION OF A SOFTWARE COMPONENT OF A SOFTWARE SYSTEM - In a method for the transparent replication of a software component (SWC | 2010-07-29 |
20100192165 | ASCERTAINING DOMAIN CONTEXTS - Various embodiments pertain to ascertaining domain contexts. In one embodiment, an application receives content that may contain a script (i.e. code). In this case, the domain context is ascertained and the script is executed in the context of the domain associated with the received content, rather than requiring the application or some other component to navigate to a location, such as a web location, to attempt to ascertain the domain context of the script. In another embodiment, third party objects or code are required to provide their domain context to an application in order for the application to make a security-based decision. | 2010-07-29 |
20100192166 | Flex integration with a secure application - Systems and methods are provided that facilitate communication between an Flex application and a secure Enterprise Application System. An embodiment comprises the EAS, an ActiveX control container provided by the EAS to communicate via Javascript, and a container web page including a Flex application and a Javascript function to invoke the Flex application, wherein the EAS can invoke the Flex application. | 2010-07-29 |
20100192167 | GRAPHICAL USER INTERFACE GENERATION THROUGH USE OF A BINARY FILE - A system for generating and displaying a graphical user interface on a computer screen is described herein. The system includes a receiver component that receives a binary formatted file and a virtual machine that generates a graphical user interface based at least in part upon the binary formatted file. A display component causes the graphical user interface to be displayed on the computer screen. | 2010-07-29 |
20100192168 | DISC DEVICE - A disc device that performs insertion and ejection of a disc into and from a main unit by using a conveying roller includes a slider member for performing an operation of upwardly and downwardly moving the above-mentioned conveying roller, an operation of upwardly and downwardly moving an arm clamp for pressing the above-mentioned disc onto a turntable to hold the above-mentioned disc, and an operation of locking and unlocking a playback base on which the above-mentioned turntable is disposed. An engagement part for engaging with both an engagement part of the above-mentioned arm clamp and an engagement part of the above-mentioned playback base at a point is disposed in the above-mentioned slider member. | 2010-07-29 |
20100192169 | DATA STORAGE MEDIUM SUPPORT MEMBER, CHUCKING DEVICE, BRUSHLESS MOTOR, AND DISC DRIVE APPARATUS - A data storage medium support member is produced by resin molding. The data storage medium support member includes an accommodating portion, a guide portion, and a gate cut portion. The accommodating portion accommodates a magnetic member around a central axis. The guide portion has a guide surface for guiding an inner edge of a disc, and is arranged radially outward of the accommodating portion. The gate cut portion is formed on a rear surface of the guide portion. The data storage medium support member can be produced by the resin molding while securing space for accommodating the magnetic member and preventing an increase in the axial dimension of the data storage medium support member. | 2010-07-29 |
20100192170 | Device assisted service profile management with user preference, adaptive policy, network neutrality, and user privacy - Various embodiments are disclosed for a services policy communication system and method. In some embodiments, a communications device implements a service profile for assisting control of the communications device use of a service on a network, in which the service profile includes service policy settings; monitors use of the service based on the service profile; and modifies a service policy setting to achieve a service usage goal. | 2010-07-29 |
20100192171 | Set-Top Box - Various embodiments of a set-top box are described. In some embodiments, a set-top box for controlling a display device includes first circuitry configured to control the display of information on the display device, a housing sized to contain the first circuitry, and one or more adjustable grips attached to the housing. The adjustable grips may be adapted to removably attach the set-top box to the display device. In some cases, a set-top box may be adapted to sit atop a display device having a thickness (in a viewing direction) of less than six, three, two, one, or even 0.5 inches. Some embodiments may be shaped to “hang” on a top surface or edge of a display device. Some embodiments include a set-top box having a feature shaped to hook, latch, or otherwise engage with a display device. | 2010-07-29 |
20100192172 | PROGRAM GUIDE SYSTEM WITH MONITORING OF ADVERTISEMENT USAGE AND USER ACTIVITIES - A program guide system is provided in which interactive television program guide advertisement usage is monitored. Advertisement usage may be monitored by monitoring when advertisements are transmitted from a television distribution facility to user television equipment. Advertisement usage information may also be monitored by monitoring when advertisements are received by the user television equipment. Advertisement usage information may also be monitored at the time at which advertisements are displayed by a program guide. Less important data may be filtered from the collected advertisement usage data. Other activities that may be monitored include the viewing activities of the user, which program guide screens are displayed, and which non-program-guide applications are used. Real-time ratings information (e.g., real-time ratings of the popularity of certain television programs, video games, or other applications) may be provided to users in real time. | 2010-07-29 |
20100192173 | INFORMATION PROCESSING SYSTEM RELATING TO CONTENT DISTRIBUTION, STORAGE MEDIUM FOR STORING PROGRAM DIRECTED THERETO, AND INFORMATION PROCESSING DEVICE - A CPU shows animation in which an introduction character appears. In succession, the CPU has a profile of the introduction character displayed. Thereafter, the CPU has a substance of a content displayed, based on a title or the like included in motion picture information downloaded from a distribution server. Namely, the CPU causes a monitor to display the introduction character (a character object) based on obtained character information and outputs information for introducing a specific content in association with the introduction character (the character object) based on obtained content information. | 2010-07-29 |
20100192174 | Method and Apparatus for Controlling Time-Scale Modification During Multi-Media Broadcasts - One embodiment of the present invention is a method for broadcasting information to a client device, which device utilizes presentation rates to present information at various presentation rates, and which method includes: (a) broadcasting information; and (b) broadcasting guidance information used to determine presentation rates for use by the client device in presentation of the information; wherein the guidance information is transmitted at or not at a time of broadcast of the broadcast information. | 2010-07-29 |
20100192175 | System And Method Of Providing Media Content - A system for providing content to a user, comprising a transmitter | 2010-07-29 |
20100192176 | STORAGE MEDIUM FOR STORING PROGRAM CAPABLE OF IMPROVING DEGREE OF FREEDOM AND EFFECT OF CONTENT PROVIDED BY SPONSOR AND INFORMATION PROCESSING DEVICE - A CPU accesses a content corresponding to a motion picture ID included in designated motion picture information, among contents uploaded to a distribution server. Then, when distribution of the content from the distribution server is started, the CPU carries out streaming-play of the received content. Thereafter, the CPU determines whether a sponsor is brought into correspondence with the reproduced content or not. When the sponsor is brought into correspondence with the reproduced content, the CPU downloads a sponsor content list from the distribution server. | 2010-07-29 |
20100192177 | INTERACTIVE MEDIA SYSTEM AND METHOD FOR PRESENTING PAUSE-TIME CONTENT - Interactive media systems and methods are provided for substituting pause-time content in place of media that has been paused. The user may pause media such as real-time media, video-on-demand media, near video-on-demand, or recorded media. If the user pauses real-time media or near video-on-demand media, the interactive media application may store the media. The interactive media application may also provide the user with the ability to rewind, resume play of, and fast-forward the media. The pause-time content may be audio or video media and may be an advertisement, trivia, program summaries or any other suitable pause-time content. The interactive media application may provide customized pause-time content specific to the user or specific to the media paused by using media data associated with the media. The interactive media application may also prevent the user from accessing features (e.g., fast-forward) of the system. | 2010-07-29 |
20100192178 | Capture of stylized TV table data via OCR - In certain implementations consistent with the present invention, a method of detecting text in a television video display table involves saving a frame of video to a memory device; determining that the frame of video contains a table having cells containing text; storing a working copy of the frame of video to a memory; isolating text in the table by: removing any table boundaries from the image; removing any cell boundaries from the image; determining if the image has three dimensional or shadow attributes and removing any three dimensional or shadow attributes identified; thereby producing text isolated against a contrasting color background; and processing the isolated text using an optical character recognition (OCR) engine to extract the text as data. This abstract is not to be considered limiting, since other embodiments may deviate from the features described in this abstract. | 2010-07-29 |
20100192179 | INTERACTIVE TELEVISION PROGRAM GUIDE SYSTEM AND METHOD WITH NICHE HUBS - A system for providing interactive television program guide features and other features and information related to a specific user interest or programming category in niche hubs is provided. All of the television programming features provided by user television equipment that relate to a specific user interest or programming category may be accessed from the niche hub. For example, a movie lovers niche hub may provide programming features such as television program listings for movies, video-on-demand listings for movies, pay-per-view listings for movies, web site links related to movies, movie-related merchandise, movie news groups, movie chat groups, movie e-mail clubs, movie contests, movie trivia questions, movie actor interviews, movie reviews, movie channel package ordering, etc. The programming features of the niche hubs may be transmitted from a server, database, or other storage facility via a television distribution facility. User television equipment may be connected via two-way communications paths to transmit messages to each other. | 2010-07-29 |
20100192180 | SYSTEMS AND METHODS FOR DETERMINING SUBSCRIPTION DATA - A media guidance application is provided by which users can view program listings associated with programming that the user may access using other user equipment devices. The media guidance application, implemented on, for example, a remote system, may determine through communications with television equipment whether or not the television equipment is authorized to provide a particular package of television programming to be viewed by the user. For example, an online program guide application may determine whether or not television equipment allows a user to view particular channels and, based on that determination, proceed to determine what packages of programming the user subscribes to. A customized program guide may then be displayed based on what programming the user subscribes to on various systems. | 2010-07-29 |
20100192181 | System and Method to Navigate an Electonic Program Guide (EPG) Display - Systems and methods of navigating and presenting electronic program guide data are provided. A particular method includes displaying an electronic program guide (EPG) detail view at a display device and displaying an EPG map view at the display device concurrently with the EPG detail view. The EPG detail view includes more detailed information than the EPG map view regarding a selected portion of the EPG map view. The selected portion includes a first range of times and a first set of channels. The method also includes receiving EPG control input to change the portion of the EPG map view that is selected. The method further includes modifying the EPG detail view in response to the EPG control input. | 2010-07-29 |
20100192182 | ANIMATED STATION IDENTIFIER IN PROGRAM GUIDES - A television program guide is displayed having a station identifier portion in a first location. A determination is made as to when a user navigates in the television program guide between past programs and future programs. In response to the user navigating in the television program guide between the past programs and the future programs, the station identifier portion is changed to a second location. | 2010-07-29 |
20100192183 | Mobile Device Access to Multimedia Content Recorded at Customer Premises - A multimedia content provider network includes a customer premises equipment (CPE) and a mobile device connected to a provider network. The CPE receives and stores multimedia content from the provider network. The mobile device provides a unique identifier to the CPE for authentication purposes. Responsive to the CPE verifying that the unique identifier is pre-designated as authorized, the CPE provides data representative of a GUI for display at the mobile device, the GUI including a listing of multimedia content recorded at the CPE. A user of the mobile device then can request a particular recorded multimedia content. In response to the request, the CPE encodes the multimedia content and transmits the encoded multimedia content to the mobile device for processing and display at the mobile device. | 2010-07-29 |
20100192184 | APPARATUS AND METHOD FOR EFFECTIVELY IMPLEMENTING A WIRELESS TELEVISION SYSTEM - An apparatus and method for effectively implementing a wireless television system may include a communications processor and a transmitter device that combine at least one of a local-area network interface, a wide-area network interface, and one or more television data interfaces for effectively performing a wireless network transmission process. A transmitted stream from the wireless television system may be received via wireless network processing for viewing local-area network data, wide-area network data (such as Internet data), or television data by flexibly utilizing various electronic devices such as a notepad personal computer, a personal digital assistant (PDA), or a handheld TV remote control device. | 2010-07-29 |
20100192185 | APPARATUS AND METHOD FOR EFFECTIVELY IMPLEMENTING A WIRELESS TELEVISION SYSTEM - An apparatus and method for effectively implementing a wireless television system may include a communications processor and a transmitter device that combine at least one of a local-area network interface, a wide-area network interface, and one or more television data interfaces for effectively performing a wireless network transmission process. A transmitted stream from the wireless television system may be received via wireless network processing for viewing local-area network data, wide-area network data (such as Internet data), or television data by flexibly utilizing various electronic devices such as a notepad personal computer, a personal digital assistant (PDA), or a handheld TV remote control device. | 2010-07-29 |
20100192186 | APPARATUS AND METHOD FOR EFFECTIVELY IMPLEMENTING A WIRELESS TELEVISION SYSTEM - An apparatus and method for effectively implementing a wireless television system may include a communications processor and a transmitter device that combine at least one of a local-area network interface, a wide-area network interface, and one or more television data interfaces for effectively performing a wireless network transmission process. A transmitted stream from the wireless television system may be received via wireless network processing for viewing local-area network data, wide-area network data (such as Internet data), or television data by flexibly utilizing various electronic devices such as a notepad personal computer, a personal digital assistant (PDA), or a handheld TV remote control device. | 2010-07-29 |
20100192187 | Notifying User of Missing Events to Prevent Viewing of Out-of-Sequence Media Series Events - In one embodiment, a method comprises detecting that a user has requested presentation of a media content item from a media series having a prescribed sequence of media series events, the media content item containing a subsequent media series event from the media series; determining that the user has not consumed an antecedent media series event, the antecedent media series event not in the media content item and preceding the subsequent media series event in the prescribed sequence of media series events; and sending a message notifying the user that the user has not consumed at least the antecedent media series event, enabling the user to defer presentation of the media content item and consume the antecedent media series event. | 2010-07-29 |
20100192188 | SYSTEMS AND METHODS FOR LINKING MEDIA CONTENT - Systems and methods are described for presenting a plurality of media clips to a viewer using a media player device. A first media clip is displayed on the media player, and an indicator corresponding to a second media clip is provided during playback of the first media clip. In response to the viewer selecting the indicator, playback of the first media clip is suspended, and information is stored about the first media clip on the media player device. The second media clip can then be subsequently displaying on the media player device. After displaying the second media clip, the stored information can be retrieved, and playback of the first media clip can resume from the point that playback was previously interrupted. | 2010-07-29 |
20100192189 | APPARATUS AND METHOD FOR SHARING BROADCASTING PROGRAM - Provided are an apparatus and method for sharing a broadcasting program, and more particularly, an apparatus and method for sharing a broadcasting program via the Internet. The apparatus includes a list manager which manages a list of devices storing a broadcasting program and a device information transmitter which transmits information, to a first device, about a second device storing a broadcasting program requested by the first device, wherein the second device divides the requested broadcasting program into time slots and transmits each time slot to the first device. | 2010-07-29 |
20100192190 | METHOD AND SYSTEM FOR MEDIA ADAPTION - A method includes receiving a media request for a target device. The signaling information may be received from the target device and a media server. At least one attribute of the target device and the media server may be identified using the signaling information. At least one attribute of the target device and the media server may be evaluated against a service level objective to select a media format. The service level objective may include consideration of the target device and available bandwidth over a provider network. The media may be provided in the selected media format over the provider network to the target device. | 2010-07-29 |
20100192191 | ALERT MESSAGING IN A TELEVISION SYSTEM - A television system in which a telephone network is used for transmitting to a television receiver from a computer messages in the form of packets of information represented visually as pages. The television receiver is provided with control means for transmitting responses via the telephone network and for selecting a page, and the packets of information are stored by the computer in the form of information blocks each including a first information packet representing the message of a corresponding page and a second information packet representing data relating to the same page. The information blocks further include a third information packet to be received by the computer from a remote terminal via the telephone network and to instruct the computer to make such a transmittal that the data are represented visually at the television receiver as information added to the messages in a chosen subfield of the page. In a preferred embodiment, the computer is provided with a physical security monitoring system and arranged to make the transmittal dependent on local events detected by this system. | 2010-07-29 |
20100192192 | SYSTEMS AND METHODS FOR EXPORTING DIGITAL CONTENT USING AN INTERACTIVE TELEVISION APPLICATION - The present invention relates to methods and systems for extracting digital content using an interactive television application. The interactive television application may allow the user to record programs on a set-top box. The interactive television application may also allow the user to extract the audio from one of the recorded programs and transfer the extracted audio to removable media (e.g., a CD-R). The interactive television application also be configured to perform a future transfer of digital content to removable media. The future transfer may occur without requiring any further user interaction. | 2010-07-29 |
20100192193 | SECURITY RESTRICTION TECHNIQUES FOR BROWSER-BASED APPLICATIONS - Various technologies and techniques are disclosed for restricting security levels that can be used with browser-based applications. When a request is received from an external application to retrieve data for use in a client browser, an intersection is performed on a permission set of a user of the client browser and of the external application to determine a new permission set to use for retrieving the requested data. Techniques for restricting operations of an external application that is being run in a client browser are also described. A session token is returned to a client browser after validating access can be granted to the client browser. Validation is performed to confirm access can be granted to an external application. A request for data is received from the external application, with the request for data containing the session token. The requested data is retrieved and returned to the external application. | 2010-07-29 |
20100192194 | EXTRACTION OF CODE LEVEL SECURITY SPECIFICATION - A method comprising, receiving a source code, identifying a data structure access in the source code, determining whether the data structure access is associated with a security check function, defining the data structure access as a security sensitive operation responsive to determining that the data structure access is associated with the security check function, and defining a security specification to include the security check function and the security sensitive operation. | 2010-07-29 |
20100192195 | MANAGING SECURITY CONFIGURATION THROUGH MACHINE LEARNING, COMBINATORIAL OPTIMIZATION AND ATTACK GRAPHS - The claimed subject matter provides systems and/or methods that combat identity follow-on attacks. The system can include components for receiving a plurality of security configuration changes, selecting which of the changes included in the plurality of security changes to approve or disapprove, and based on which of the changes are approved or disapproved by an administrator, generating a further plurality of security configuration changes that the administrator can once again approve or disapprove until the administrator is satisfied with the security configuration changes. | 2010-07-29 |
20100192196 | HEALTH-BASED ACCESS TO NETWORK RESOURCES - A protection system is described herein that dynamically determines whether a computer system can access a particular resource based on a combination of a dynamic health state of the computer system and a dynamic reputation of the resource. When a user attempts to access a resource, the protection system intercepts the request. The protection system determines the reputation of the resource that the user is attempting to access and the health of the computer system through which the user is attempting to access the resource. Based on the determined resource reputation and the determined computer system health, the protection system determines whether to allow the requested access to the resource. | 2010-07-29 |
20100192197 | Context-Sensitive Confidentiality within Federated Environments - Techniques are disclosed for achieving context-sensitive confidentiality within a federated environment for which content is aggregated in a distributed Web portal (or similar aggregation framework), ensuring that message portions that should be confidential are confidential to all entities in the federated environment except those entities to which the message portions may properly be divulged. The federation may comprise an arbitrary number of autonomous security domains, and these security domains may have independent trust models and authentication services. Using the disclosed techniques, messages can be routed securely within a cross-domain federation (irrespective of routing paths), thereby ensuring that confidential information is not exposed to unintended third parties and that critical information is not tampered with while in transit between security domains. Preferred embodiments leverage Web services techniques and a number of industry standards. | 2010-07-29 |
20100192198 | CACHING OF PRIVATE DATA FOR A CONFIGURABLE TIME PERIOD - A computer implemented method, apparatus, and computer program product for generating cookies. A cookie value is retrieved in response to receiving the request. An expiration for the cookie value is set based on a time period in which the request is received. A set of unique identifiers, including the expiration, are added to the cookie value and a cookie name to form a cookie. A response to the request is sent to an intermediate server. The response includes data responsive to the request and the cookie. The validity of the data for the response is related to the expiration. | 2010-07-29 |
20100192199 | CREATING AND USING A SPECIFIC USER UNIQUE ID FOR SECURITY LOGIN AUTHENTICATION - A method of monitoring all network login activity, which includes a real-time analysis of intercepting all network login activity, analyzing network login activity, authenticating network login activity and closing (i.e., terminating) those network login connections that are not authenticated to proceed and access the network. | 2010-07-29 |
20100192200 | Control program providing method using communication system, center apparatus in communication system, user apparatus in communication system, and program recorded on recording medium in user apparatus - A method includes creating process data which constitutes at least a portion of the control program and describes the execution contents of the communication functions, and parameter data which constitutes a different portion of the control program from the process data portion and is used to describe individual setting information of user in accordance with the process data, in the center apparatus, sending the process data, and the parameter data from the center apparatus to the user apparatus via the communication network, receiving the process data and the parameter data from the center apparatus, then describing input individual setting information in the parameter data to create the control program, in the user apparatus, recording the resulting control program onto a recording medium, and reading the control program from the recording medium and setting the read control program in the communication equipment as requested by the user, in the user apparatus. | 2010-07-29 |
20100192201 | Method and Apparatus for Excessive Access Rate Detection - A system and method for protection of Web based applications are described. Anomalous traffic can be identified by comparing the traffic to a profile of acceptable user traffic when interacting with the application. Excessive access rates are one type of anomalous traffic that is detected by monitoring a source and determining whether the number of requests that the source generates within a specific time frame is above a threshold. The anomalous traffic, or security events, identified at the individual computer networks are communicated to a central security manager. The central security manager correlates the security events at the individual computer networks to determine if there is an enterprise wide security threat. The central security manager can then communicate instructions to the individual computer networks so as to provide an enterprise wide solution to the threat. Various responsive actions may be taken in response to detection of an excessive access rate. | 2010-07-29 |
20100192202 | System and Method for Implementing a Secured and Centrally Managed Virtual IP Network Over an IP Network Infrastructure - A method and system for establishing secure IP communication, through a virtual IP network, between at least first and second nodes comprise an access manager for validating a communication request, initiated by one of the at least first and second nodes, for communication between the at least first and second nodes. The access manager further grants at least one unique identifier to each of the at least first and second nodes upon successful validation. A channel provides for secure IP communication between the at least first and second nodes through the virtual IP network using their respective at least one unique identifier. | 2010-07-29 |
20100192203 | CONTENT DISTRIBUTION WITH INHERENT USER-ORIENTED AUTHORIZATION VERIFICATION - The invention relates to a method for verifying the use authorization of an access to a communications service ( | 2010-07-29 |
20100192204 | Application Identity Design - Methods and apparatus, including computer program products, implementing and using techniques for providing user credentials over a network to a remote computer application. User credentials for the remote computer application are stored in a central repository that is accessible through the network. A request is sent to a service to perform, on behalf of a user, a particular task involving the remote computer application. It is determined whether the service has been granted permission to act on behalf of the user with respect to the remote computer application. When the service has permission to act on behalf of the user, the service is used to retrieve the user's credentials for the remote computer application from the central repository and to supply the retrieved user credentials to the remote computer application. | 2010-07-29 |
20100192205 | PREVENTING INADVERTENT LOCK-OUT DURING PASSWORD ENTRY DIALOG - One embodiment provides a computer-implemented method for providing controlled access to electronic content. A password is associated with electronic content, such as by password-protecting an electronic file that contains the electronic content. At least one password attempt is received in an effort to access the electronic content. Each password attempt is compared to the password at a selected subset of “trap” character positions. Up to a threshold number of password entries is allowed that have incorrect characters at any of the trap character positions. A greater number or even an unlimited number of incorrect password entries are allowed having incorrect characters at non-trap character positions. Access to the electronic content is allowed only if one of the password entries exactly matches the password. | 2010-07-29 |
20100192206 | BULLETIN BOARD SYSTEM, TERMINAL DEVICE OF BULLETIN BOARD SYSTEM, AND SERVER DEVICE OF BULLETIN BOARD SYSTEM - A unique authentication ID is given to a television to automatically log in a server by using the ID. A password used for logging in the server is registered to the server from the television for each mobile phone of sub-users who share the television. A message may be input from both of the television and the mobile phone. The authentication ID, the password, a message, a user name, and an input date are stored in the server. When being accessed from the television or the mobile phone, the server generates and transmits an HTML to be displayed on the television or the mobile phone, and thus, a message is displayed in a predetermined display format for each of the television and the mobile phone. | 2010-07-29 |
20100192207 | Virtual service provider systems - Various embodiments are disclosed for a services policy communication system and method. In some embodiments, a network device executes a service controller for a plurality of device groups, in which the service controller includes a capability to securely partition one or more device group database partitions, each device group partition includes service controller system settings, and each device group includes a plurality of communication devices controlled by a virtual service provider. | 2010-07-29 |
20100192208 | METHOD AND SYSTEM FOR PREVENTING IMPERSONATION OF A COMPUTER SYSTEM USER - A system and method for preventing an administrator impersonating a user from accessing sensitive resources on a target system is provided. The method comprises receiving a first request from a user to change the user's password on a target system to be changed, sending a “change password” request for the user to the target system, storing the user's new password, receiving a second request from the target system on behalf of the user for access to a sensitive resource, wherein the second request contains information about the user's password, and denying the second request if the information about the user's password is not consistent with the user's stored new password. | 2010-07-29 |
20100192209 | PASSIVE SECURITY ENFORCEMENT - Technology is described for enabling passive enforcement of security at computing systems. A component of a computing system can passively authenticate or authorize a user based on observations of the user's interactions with the computing system. The technology may increase or decrease an authentication or authorization level based on the observations. The level can indicate what level of access the user should be granted. When the user or a component of the computing device initiates a request, an application or service can determine whether the level is sufficient to satisfy the request. If the level is insufficient, the application or service can prompt the user for credentials so that the user is actively authenticated. The technology may enable computing systems to “trust” authentication so that two proximate devices can share authentication levels. | 2010-07-29 |
20100192210 | METHOD AND SYSTEM FOR VERIFYING ENTITLEMENT TO ACCESS CONTENT BY URL VALIDATION - Aspects include a mechanism of entitling users to transacted-for digital content access, indicating download authorization with discrete authentication URLs, and validating download attempts using each such URL. The authentication mechanism comprises producing an encrypted string included in a URL provided to a user. The encrypted string comprises transaction identifier information, and information about the transacted-for entitlement. When a user wishes to exercise the transacted-for entitlement, the user activates the URL, which is resolved to a location that has/can obtain access to the key(s) used in producing the encrypted string, decrypt the string, and use the information in it to validate the URL and the entitlement. The validation can use data retrieved from a database, using the transaction identifier as a key. The entitlement information included in the now-decrypted string can be compared with the prior download information. A byte range of requested by a browser using the URL can be used in validation, as well as how a particular authorization/validation should count for entitlement fulfillment. | 2010-07-29 |
20100192211 | Revocable Object Access - Techniques are described to provide revocable object access. In an implementation, a user may provide content and an object (e.g., a picture) to be published with the content. The object is uploaded to a storage location, and a uniform resource locator (URL) that includes a token is generated for the object. The token is registered in an access control list (ACL), and token permission settings in the ACL are utilized to control access to the object. The URL may be embedded in the content. When a viewer requests the content, the object may be retrieved from the storage location using the URL. The user may revoke access to the object by changing the token permission settings in the ACL. | 2010-07-29 |
20100192212 | Automated device provisioning and activation - Various embodiments are disclosed for a services policy communication system and method. In some embodiments, a communications device stores a set of device credentials for activating the communications device for a service on a network; and sends an access request to the network, the access request including the set of device credentials. | 2010-07-29 |
20100192213 | SYSTEM AND METHOD FOR DYNAMIC BANDWIDTH PROVISIONING - Embodiments disclosed herein provide a control device and a method executing thereon for allocating network bandwidth to users accessing a controlled network. In response to a user connecting to the control device using a user device, the control device obtains a user bandwidth allocation profile for that user based on user credentials. The user bandwidth allocation profile may be stored local or remote to the control device. A provisioning module running on the control device can map attributes in the user bandwidth allocation profile to a traffic control rule and associate the traffic control rule with the user based on the user credentials and considering information identifying the user device used by the user to connect to the control device. A traffic conditioning module running on the control device can regulate the network bandwidth usage by the user utilizing the traffic control rule associated with the user. | 2010-07-29 |
20100192214 | INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND RECORDING MEDIUM INCLUDING COMPUTER PROGRAM - An information processing method includes receiving user information from a input unit pre-corresponded to the executer; acquiring the received user information via the corresponded input unit; determining whether the acquired user information matches the user information of the pre-corresponded user; starting a standard operation when the acquired user information is determined to match the user information of the pre-corresponded user; requesting the controller to identify another executer corresponded to the acquired user information when the acquired user information is determined to fail to match the user information of the pre-corresponded user; identifying the other executer corresponded to the user information when the executer requests the other executer corresponded to the user to be identified; and switching between the input unit corresponded to the executer having requested the other executer to be identified and the input unit corresponded to the other executer when the other executer is identified. | 2010-07-29 |
20100192215 | Method for Multi-Core Processor Based Packet Classification on Multiple Fields - The present invention relates to a method for multi-core processor based packet classification on multiple fields. The first step involved in this invention involves constructing a data structure of classification, which includes selecting a certain dimension such that the sum of the rules that fall into two rule sub-sets of two subspaces is as small as possible after spatial partition through a certain partition point in which the method to determine the partition point on the selected dimension is to select the partition point on the dimension such that the number of rules that fall into the two sub-spaces after partition by the point is equal to each other as much as possible. The invention specifically proposes three methods to select partition points, two associated methods to select dimensions, then receiving packet information after the data structure of classification is constructed, and searching the data structure of classification according to packet information to get matched results. The present invention can be implemented on many types of multi-core processor based platforms which ensure favorable performance and adaptive capabilities for different network applications, and significantly reduce the product cost of high-end routers and firewalls. | 2010-07-29 |
20100192216 | SECURITY GATEWAY SYSTEM, METHOD AND PROGRAM FOR SAME - A non-secure network gateway | 2010-07-29 |
20100192217 | System and method for information sharing between non-secure devices - A method for communicating information packets from a first host system operating in a first security domain and in accordance with a non-secure communications protocol, using a dataguard, to a second host system operating in a second security domain different than the first security domain, and where the second host system is also operating in accordance with the non-secure communications protocol. The method may involve: using a first driver operating with the dataguard to interface the dataguard with the first host system; using a first proxy task group operating with the dataguard to interface the dataguard to the first driver and to communicate with the first driver in accordance with a protocol of the first security domain; using a second driver operating with the dataguard to interface the dataguard to the second host system; and using a second proxy task group operating with the dataguard to interface the dataguard to the second proxy task group and to communicate with the second driver in accordance with a protocol of the second security domain. | 2010-07-29 |
20100192218 | METHOD AND SYSTEM FOR PACKET FILTERING FOR LOCAL HOST-MANAGEMENT CONTROLLER PASS-THROUGH COMMUNICATION VIA NETWORK CONTROLLER - A network controller in a communication device may be operable to provide pass-through communication of local host-management traffic between a local host and a management controller within the communication device, wherein the local host may be operable to utilize its network processing resources during communication of the local host-management traffic. The network controller may use packet filtering to provide the pass-through communication, wherein the network controller may utilize a plurality filtering rules during filtering of packets received in the network controller. The filtering rules may specify packet processing and/or forwarding actions by said network controller based on one or more specified conditions. The specified conditions may based on one or more match criteria; wherein the match criteria comprising source address, destination address, and/or traffic type data in the received packets. Address learning mechanisms may be used in the network controller to enable configuring and/or performing packet filtering transparently. | 2010-07-29 |
20100192219 | TEMPORALLY SYNCHRONIZED VIDEO DISPLAY UNIT SCREENSAVER OR WALLPAPER BASED ON USER PREFERENCES - A method of generating an audiovisual object such as a wallpaper or screensaver keyed to a user's preferences, local time, and location, comprising: collecting a set of user preferences for a user; providing a metadata stream associated with an audiovisual input; comparing elements within the metadata stream with the set of user preferences to form a comparison; and outputting an audiovisual object to the user's video display unit if the comparison indicates that the metadata stream matches one or more elements of the set of user preferences. User preferences may be collected from user habits based on metadata streams associated with the audiovisual input, or may be directly input by the user. The methods above may also be stored on a computer readable medium. | 2010-07-29 |
20100192220 | APPARATUSES, METHODS AND SYSTEMS FOR PROVIDING A VIRTUAL DEVELOPMENT AND DEPLOYMENT ENVIRONMENT INCLUDING REAL AND SYNTHETIC DATA - The APPARATUSES, METHODS AND SYSTEMS FOR PROVIDING A VIRTUAL DEVELOPMENT AND DEPLOYMENT ENVIRONMENT INCLUDING REAL AND SYNTHETIC DATA (“SYNONYM”) provides a development and test environment with reduced database storage requirements that uses synthetic data based on anonymized real data. SYNONYM allows the use of sensitive data for testing while protecting such data as required by privacy laws, secrecy laws and company policies. | 2010-07-29 |
20100192221 | System and Method for Automated Data Retrieval Based on Data Placed in Clipboard Memory - A data retrieval system and method of the invention provide automatic retrieval of information based on data placed into, for example, a Windows™ clipboard. A user highlights and cuts (or pastes) data into the clipboard during execution of an application program. A data retriever program periodically reads the clipboard to determine whether new data has been placed therein. Upon finding new data in the clipboard, the data retriever program determines whether the data or a variation thereof satisfies a predetermined criterion. If the criterion is satisfied, the data retriever program initiates a data-retrieval operation, such as a Web-based search, based on the data. If the criterion is not satisfied, the data retriever program does not perform any data-retrieval action. The data retrieval program does not interfere with the clipboard; any application program sharing the clipboard can use data placed therein, e.g., by a paste operation. | 2010-07-29 |
20100192222 | MALWARE DETECTION USING MULTIPLE CLASSIFIERS - A method of identifying a malware file using multiple classifiers is disclosed. The method includes receiving a file at a client computer. The file includes static metadata. A set of metadata classifier weights are applied to the static metadata to generate a first classifier output. A dynamic classifier is initiated to evaluate the file and to generate a second classifier output. The method includes automatically identifying the file as potential malware based on at least the first classifier output and the second classifier output. | 2010-07-29 |
20100192223 | Detecting Malicious Network Content Using Virtual Environment Components - Malicious network content is identified based on the behavior of one or more virtual environment components which process network content in a virtual environment. Network content can be monitored and analyzed using a set of heuristics. The heuristics identify suspicious network content communicated over a network. The suspicious network content can further be analyzed in a virtual environment that includes one or more virtual environment components. Each virtual environment component is configured to mimic live environment components, for example a browser application component or an operating system component. The suspicious network content is replayed in the virtual environment using one or more of the virtual environment components. The virtual environment component behavior is analyzed in view of an expected behavior to identify malicious network content. The malicious network content is then identified and processed. | 2010-07-29 |
20100192224 | SANDBOX WEB NAVIGATION - Browsing the World Wide Web may expose a user's system to malicious attacks that can lead to data loss and/or system failure. Sometimes a user desires to access information on a web page that may contain malicious content. For example, a college student researching computer hacking may need information provided on a hacking website even though the site is potentially dangerous. Although techniques are employed to install potentially harmful executable files into a sandbox (e.g., virtual machine), these techniques do not address navigation of harmful sites. Functionality can be implemented to instantiate a web browser within a controlled virtual environment (“sandbox”) that simulates the host system while restricting the virtual environment to designated space(s) and/or resources of the host system to prevent harmful effects. Instantiating the web browser in the sandbox allows web navigation of risky web sites without deleterious effects on the host system. | 2010-07-29 |
20100192225 | EFFICIENT APPLICATION IDENTIFICATION WITH NETWORK DEVICES - In general, techniques are described for efficiently implementing application identification within network devices. In particular, a network device includes a control unit that stores data defining a group Deterministic Finite Automata (DFA) and an individual DFA. The group DFA is formed by merging non-explosive DFAs generated from corresponding non-explosive regular expressions (regexs) and fingerprint DFAs (f-DFAs) generated from signature fingerprints extracted from explosive regexs. The non-explosive regexs comprise regexs determined not to cause state explosion during generation of the group DFA, the signature fingerprints comprise segments of explosive regexs that uniquely identifies the explosive regexs, and the explosive regexs comprise regexs determined to cause state explosion during generation of the group DFA. The network device includes an interface that receives a packet and the control unit traverses first the group DFA and then, in some instances, the individual DFAs to more efficiently identify network applications to which packets correspond. | 2010-07-29 |
20100192226 | Intrusion Event Correlation System - Disclosed is a system for correlating intrusion events using attack graph distances. The system includes an attack graph generator, an exploit distance calculator, an intrusion detector, an event report/exploit associator, an event graph creator, an event graph distance calculator, a correlation value calculator, and a coordinated attack analyzer. An attack graph is constructed for exploits and conditions in a network. The exploit distance calculator determines exploit distances for exploit pair(s). The intrusion detector generates event. Events are associated with exploits. Event graph distances are calculated. Correlation values are calculated for event pair(s) using event graph distances. The correlation values are analyzed using a correlation threshold to detect coordinated attacks. | 2010-07-29 |
20100192227 | OFFLINE EXTRACTION OF CONFIGURATION DATA - A configuration scanning system is described herein that scans a system configuration database for malware-related information with less impact on other operations that access the system configuration database. The system employs techniques to reduce the impact on other operations that access the configuration database, including parsing a file-based stored version of the configuration database, accessing the configuration database using opportunistic locking, and caching configuration information obtained by scanning the configuration database. In this way, the system is able to respond to requests antimalware programs using cached information without impacting other programs using the configuration database. Thus, the configuration scanning system protects a computer system against malware while reducing the burden on the configuration database and on other programs that access the configuration database. | 2010-07-29 |
20100192228 | DEVICE, METHOD AND PROGRAM PRODUCT FOR PRIORITIZING SECURITY FLAW MITIGATION TASKS IN A BUSINESS SERVICE - A device, method, and program product for prioritizing security flaw mitigation tasks is provided. The device, method, and program product are configured to receive, at a risk analysis engine, one or more business service models from a configuration management database, wherein the one or more business service models each comprises a set of configuration items, and wherein the one or more business service models each indicate a type of configuration item and a connectivity of the configuration item. The set of configuration items are sent to a vulnerability assessment tool to obtain one or more vulnerability assessment scores for each configuration item within the set of configuration items. A risk score for each configuration item is then determined. In turn, a prioritized list of configuration items is output based on the risk score of each configuration item. | 2010-07-29 |
20100192229 | PRIVILEGE VIOLATION DETECTING PROGRAM - A privilege violation detecting program stored on a computer-readable medium causes a computer to detect a privilege violation of an test target program by receiving an authority request API from an authority request API trace log storing unit; reading out, from an object access rule storing unit, an assumed access API assumed to be output in response to the received authority request API; determining an actual access API returned in response to the received authority request API from the actual access API trace log storing unit; and storing, into a least privilege violation data storing unit, data of the received authority request API when the actual access API returned in response received authority request API does not match the read out assumed access API. | 2010-07-29 |
20100192230 | PROTECTING TRANSACTIONS - Technology is described for protecting transactions. The technology may include a switching component that a user can employ to switch an associated mobile device into a secure mode so that a user can confirm the transaction. After initiating a transaction request, the user can confirm the transaction request by activating the switching component, which can cause the mobile device to switch into a secure mode. In the secure mode, the mobile device may prevent the mobile device from conducting various normal activities, such as executing applications, receiving input, providing output, and so forth. The switching component may disable other processing temporarily. Upon receiving the confirmation from the user, the switching component may send a confirmation communication to complete the transaction. | 2010-07-29 |
20100192231 | MEDIA PACKAGE, SYSTEM COMPRISING A MEDIA PACKAGE AND METHOD OF EXECUTING PROGRAM CODE - A media package storing program code, the media package comprising a medium storing a first part of the program code intended to be executed on a processor external to the media package, and a processing device storing a state and a second part of the program code, the first and the second parts of the program code being adapted to interact when executed so as to execute the program code. The processing device comprises a processor for verifying the state and for executing the second part of the program code if the verification of the state indicates that this is authorised; and a first interface for communication with the processor external to the media package. The processing device further comprises a second interface adapted to interact with a state change device in order to set the state from a first state not authorising execution of second part of the program code to a second state authorising execution of second part of the program code. The second interface is a Radio Frequency interface adapted to, when the media package is in the first state, interact with at least one anti-theft portal. Also provided is a system. | 2010-07-29 |
20100192232 | METHOD FOR MOVING RIGHTS OBJECT IN DIGITAL RIGHTS MANAGEMENT - A method for moving Rights Object (RO) in a Digital Rights Management (DRM). RO for content is partially or entirely moved between Devices in the same group, so that the RO can be shared between the Devices and a utility thereof can be enhanced. | 2010-07-29 |
20100192233 | CONTENT REPRODUCTION DEVICE - Provided is a content playback apparatus that generates a GUI corresponding to various pieces of restriction information to restrict playback of a content when displaying the GUI for causing a user to select a content to be played back, and that can respond to a new piece of restriction information. The content playback apparatus generates content lists for the various pieces of restriction, and generates a GUI which can display each content list for each piece of restriction information by switching. When a content to which the new piece of restriction information has been attached is added, setting information for the new piece of restriction information is obtained from a content distribution server and the like by referring to an ID attached to the content, or an ID of the restriction information having been attached to the content, and a content list for the newly obtained restriction information is generated and displayed. | 2010-07-29 |
20100192234 | ACCESS RESTRICTED FILE AND ACCESS RESTRICTED FILE CREATING APPARATUS - Disclosed are an access restricted file and an restricted file creating apparatus for creating the access restricted file concerned, which makes it possible for an information processing apparatus to request a management server to determine whether the access right is present or absent. The apparatus includes a creating section to create the access restricted file that includes data, an accessing operation for which is restricted, and confirming destination information that represents the management server that confirms a presence or absence of the access right in regard to the operation for accessing the data. On the other hand, the access restricted file includes a program, being executable by a CPU of the information processing apparatus provided with a communicating function, to cause the CPU to perform a processing for requesting the management server, represented by the confirming destination information, to confirm the presence or absence of the access right. | 2010-07-29 |
20100192235 | HUMAN CHRONIC LYMPHOCYTIC LEUKEMIA MODELED IN MOUSE BY TARGETED TCL1 EXPRESSION - Transgenic animals containing a nucleic acid sequence encoding TCL1 operably linked to transcriptional control sequences directing expression to B cells are described. Such transgenic animals provide a useful animal model system for human B cell chronic lymphocytic leukemia. | 2010-07-29 |
20100192237 | Methods for Controlling Gene Expression Using Ta-Sira - The present invention is in the field of genetics, especially plant genetics, and provides agents capable of controlling gene expression. More specifically the inventions relates to methods for engineering ta-siRNA primary transcripts in order to target gene-of-interest (GOI) and control their expression. The invention further provides for a method for modulating transgenic expression by said engineered ta-siRNAs. | 2010-07-29 |
20100192238 | ELONGASES AND METHODS FOR PRODUCING POLYUNSATURATED FATTY ACIDS IN TRANSGENIC ORGANISMS - The present invention relates to polynucleotides from | 2010-07-29 |
20100192240 | REGULATION OF EXPRESSION OF PI3KBETA PROTEIN IN TUMORS - The present invention concerns the use of PI3Kβ protein and/or encoding gene for the screening for substances useful in the treatment of cancers, preferably breast cancers. The present invention also concerns a method for the diagnosis of malignant cell growth comprising the measuring the expression of PI3Kβ gene. The invention concerns also non-human transgenic animals as model study for human pathologies, preferably breast cancer, being transgenic for having altered PI3Kβ and Neu-T expression. | 2010-07-29 |
20100192241 | Production of Proteins in Eggs - Methods for preparing recombinant proteins, such as antibodies, in eggs are described. The method offers advantages over existing systems for preparing recombinant proteins including high yield, low cost and compatibility with animal protection regulations. In addition, since eggs are edible food sources the recombinant protein does not have to be isolated from the egg. | 2010-07-29 |
20100192242 | METHOD FOR CONSTITUTION AND PRODUCTION OF MULTI-GENOTYPE COLONY VARIETIES IN CROP PLANTS - This invention relates to methods for constitution and production of colony varieties of crops. Its characteristics are shown below. According to their phenotypes, single-genotype varieties, hybrid combinations or mixtures of varieties and combinations from fundamental populations, which are consistent or uniform in major characters and share particular breeding goals, will constitute the colony varieties of crops. The said single-genotype varieties or hybrid combinations are multiplied separately. According to the breeding goals, their seeds are mixed in a specific ratio to form the preparations for planting. The varieties produced in such a way are featured with uniformity, stability and peculiarity. | 2010-07-29 |
20100192243 | Guzmania hybrid named 'techno' - A new and distinct | 2010-07-29 |
20100192244 | NUCLEIC ACID SEQUENCES ENCODING TRANSCRIPTION FACTORS REGULATING ALKALOID BIOSYNTHESIS AND THEIR USE IN MODIFYING PLANT METABOLISM - Plant metabolism and alkaloid levels can be regulated by transcription factors that regulate the nicotinic alkaloid biosynthetic pathway. | 2010-07-29 |
20100192245 | SOYBEAN VARIETY D4215895 - The invention relates to the soybean variety designated D4215895. Provided by the invention are the seeds, plants and derivatives of the soybean variety D4215895. Also provided by the invention are tissue cultures of the soybean variety D4215895 and the plants regenerated therefrom. Still further provided by the invention are methods for producing soybean plants by crossing the soybean variety D4215895 with itself or another soybean variety and plants produced by such methods. | 2010-07-29 |
20100192246 | Lettuce Named DIP 6992 - A novel leaf lettuce cultivar, designated DIP 6992, is disclosed. The invention relates to the seeds of lettuce cultivar DIP 6992, to the plants of lettuce cultivar DIP 6992 and to methods for producing a lettuce plant by crossing lettuce cultivar DIP 6992 with itself or another lettuce line. The invention further relates to methods for producing a lettuce plant containing in its genetic material one or more transgenes and to the transgenic plants produced by that method and to methods for producing other lettuce lines derived from the cultivar DIP 6992. | 2010-07-29 |
20100192247 | MARKERS ASSOCIATED WITH SOYBEAN RUST RESISTANCE AND METHODS OF USE THEREFOR - Methods for conveying soybean rust (SBR) resistance into non-resistant soybean germplasm are provided. In some embodiments, the methods include introgressing SBR resistance into a non-resistant soybean using one or more nucleic acid markers for marker-assisted breeding among soybean lines to be used in a soybean breeding program, wherein the markers are linked to and/or associated with SBR resistance. Also provided are single nucleotide polymorphisms (SNPs) associated with resistance to SBR; soybean plants, seeds, and tissue cultures produced by any of the disclosed methods; seed produced by the disclosed soybean plants; and compositions including amplification primer pairs capable of initiating DNA polymerization by a DNA polymerase on soybean nucleic acid templates to generate soybean marker amplicons. | 2010-07-29 |