39th week of 2009 patent applcation highlights part 58 |
Patent application number | Title | Published |
20090241126 | Service and Commerce Based Cookies and Notification - A computer implemented method, a computer program product, and a data processing system alert a real world representative of an action within a virtual world. An indication of an avatar within a virtual world interacting with a virtual object is received. Responsive to the avatar interacting with a virtual object, a historical profile for the avatar is identified. A notification trigger is then forwarded to an electronic device external of the virtual world that the avatar has interacted with the virtual object, wherein the notification includes the historical profile. | 2009-09-24 |
20090241127 | METHOD AND SYSTEM FOR PROVIDING ACCESS TO ACTIVE OBJECTS - A method and system is provided for allowing a Java™ application to use active objects on the Symbian™ platform through the Java™ Native Interface (JNI). An active scheduler is started under Symbian™ and transferred into a separate thread after the first call to it has been made. Although the scheduler still exhibits blocking behaviour on restart, since it is executing in a separate thread, control can return to the calling Java™ application to permit the use of further active objects. | 2009-09-24 |
20090241128 | Controlling Navigation of Application Logic Using Annotated Application Code - A computer implemented method, apparatus, and computer usable program product for processing application code. In one embodiment, a call is received to invoke a set of methods of annotated application code. The annotated application code includes a set of annotations specifying a selection of the set of methods. A selected method from the set of methods is invoked in response to determining that the call is valid according to the set of annotations. Thereafter, a subsequent set of valid methods for execution is identified based upon an annotation associated with the selected method. | 2009-09-24 |
20090241129 | INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, PROGRAM AND INFORMATION PROCESSING SYSTEM - The present invention provides an information processing apparatus including a content data acquisition part for acquiring content data containing location information of a script file capable of reading secure information in an IC chip from a service providing server, a file reading part for reading the script file from a settlement operator server based on the location information of the script file contained in the content data acquired by the content data acquisition part, and a secure information reading part for reading the secure information from the IC chip based on a secure information access description contained in the script file read by the file reading part. | 2009-09-24 |
20090241130 | Virtual Interfacing Device and Related Method for Controlling the Same - To reduce product development cost, a virtual interfacing device for virtualization of a hardware device of an electronic product operating in an operating system providing a driving unit corresponding to the hardware device is provided. The virtual interfacing device relays communication between the hardware device and a Java application and includes a virtual unit and an event unit. The virtual unit includes virtual data corresponding to the hardware device, and modifies the virtual data or provides the virtual data for the Java application according to access information generated by the Java application. The event unit generates Java event information for the driving unit according to the virtual data or modifies the virtual data according to device event information generated by the driving unit. | 2009-09-24 |
20090241131 | Module interrogation - Module interrogation techniques are described in which modules configured to rely upon one or more operating system features are interrogated to determine which features are used and by which modules. A module is loaded that is configured to interact with a plurality of features provided by an operating system. Using one or more redirection techniques, calls made by the module to access features of the operating system are redirected to alternate functionality. Based on the redirection, data is generated to indicate the features of the operating system that are used by the module. The techniques may be performed for each of a plurality of modules to populate a database that relates features of the operating system to the plurality of modules. | 2009-09-24 |
20090241132 | INFORMATION PROCESSING APPARATUS AND DEVICE CONTROLLER DRIVING/CONTROLLING METHOD - According to one embodiment, an information processing apparatus includes a system memory, a device controller, a basic input/output system and a device driver. The device driver of the information processing apparatus forms its own data structure for communication control in the system memory separately from the basic input/output system, saves the address set in the register of the device controller when the device controller executes the communication with the various externally connected devices, sets an address for referring to the own data structure in the register of the device controller in order to make the device controller communicate with the various externally connected devices, and resets the saved address in the register of the device controller after the communication is completed. | 2009-09-24 |
20090241133 | METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR HIGH RELIABILITY DOWNLOADING OF BACKGROUND ASSETS USING A MANIFEST IN A VIRTUAL WORLD APPLICATION - The subject matter described herein includes methods, systems, and computer readable media for predictively downloading background assets with file-not-present tolerance in a virtual world application. According to one aspect for high reliability downloading of background assets using a manifest in a virtual world application, the method includes compiling a manifest of assets potentially needed for execution by a first instance of a virtual world application (VWA), wherein each of the assets is associated with a priority. Using the manifest and while executing the VWA, assets listed in the manifest are downloaded based on the priorities indicated in the manifest. The VWA is executed for displaying a virtual world by loading at least a subset of the assets listed in the manifest. | 2009-09-24 |
20090241134 | REMOTE STORAGE SERVICE API - Techniques are disclosed to provide an application programming interface to access data stored in a remote storage service. The data may be of any type, and is stored in core objects. | 2009-09-24 |
20090241135 | METHOD FOR CREATING A NATIVE APPLICATION FOR MOBILE COMMUNICATIONS DEVICE IN REAL-TIME - A software client ( | 2009-09-24 |
20090241136 | Method to Precondition a Storage Controller for Automated Data Collection Based on Host Input - An FTDC interface with the host or user. The interface can include a command application programming interface (API) or a data storage Command-Line Interface (DS CLI)/Graphical User Interface (GUI). In certain embodiments, the FTDC interface allows a host or user to customize a desired FTDC on a two-tiered system. The first tier is one in which a host/user selects, from a list of conditions, which ones, upon occurrence of those conditions, they would like the controller to perform FTDC. The second tier a second selection such that for each first tier item, the host/user will select the level of FTDC (collection and offloading of logs and/or the forcing and offloading of a statesave). | 2009-09-24 |
20090241137 | SERVICE ENABLEMENT BASED UPON MICROFORMATS - Computer applications commonly have various services that improve application functionality for a user. Different services can be applied to other sources, such as other applications, and users can perform functionality upon the other sources. This not only provides a user with greater options in using a source, but can also provide a user with a more familiar context when using the source. | 2009-09-24 |
20090241138 | OPTICAL DISC DRIVE - An optical disc drive including a housing, a fixing part, a flexible flat cable and an electronic component is provided. The fixing part is disposed in the housing. The flexible flat cable is disposed in the housing and includes a first and a second portions. The first portion has a component-disposed region whose backside is in contact with the fixing part. The second portion has a conductive surface, and the second portion is connected with and opposite to the first portion. The component-disposed region is located between the fixing part and the conductive surface. Additionally, the first optical disc drive is disposed on the component-disposed region. | 2009-09-24 |
20090241139 | TRAY USED IN AN OPTICAL DISK DRIVE - The present invention relates to a tray used in an optical disc drive. At least two aligning means arranged in the tray for marking an aligning line at a front side and a back side of the tray, respectively. The aligning line is used determining the dimensional accuracy of each component located on the front side and back side of the tray, respectively. | 2009-09-24 |
20090241140 | MOTOR WITH A CHUCKING DEVICE AND DISK DRIVE APPARATUS EQUIPPED WITH THE SAME - In a motor including a chucking device for detachably holding a disk, the chucking device has a center case to which a central opening of the disk is inserted; resilient members received within the center case; and claw members for holding the disk in place. Each of the claw members has a tip end portion, a disk holding surface positioned axially below the tip end portion for holding the disk in place, and a recessed sliding portion formed substantially at a circumferential center region of the disk holding surface, the sliding portion serving to guide movement of the claw member. Rest portions are formed in the center case to face the respective sliding portions, the rest portions serving to support the respective sliding portions by contacting therewith. The sliding portions are designed to make contact with the respective rest portions when the disk is mounted to the chucking device. | 2009-09-24 |
20090241141 | DISPLAY APPARATUS AND CONTROL METHOD THEREOF - A display apparatus and a control method thereof are provided. The apparatus includes a display unit, a signal processing unit, a mode setting unit which sets an environmental mode to one of an exhibition mode and a general mode, and a control unit which determines whether the set environmental mode is the exhibition mode and controls the signal processing unit to reproduce a predetermined advertisement contents and the display unit to display the reproduced advertisement contents if the environmental mode is the exhibition mode. It is possible to provide an advertisement contents using the display apparatus and the control method thereof. | 2009-09-24 |
20090241142 | Real-time insertion and reporting of media content - A method can include receiving a plurality of unperfected logs via a network, storing the plurality of unperfected logs in a database based on the anticipated broadcast schedule, transmitting at least one unperfected log by the electronic hub, receiving an inquiry into one or more spots in the available inventory, transmitting data associated with the one or more spots the data to be displayed on a graphical user interface in response to the inquiry, receiving a selection of one or more spots in the available inventory in response, and requesting content related to the selected one or more spots. The method can include receiving and associating advertising content with the selection of the one or more spots, creating a perfected log based on the unperfected log and the received content, monitoring a broadcast of the media outlet, detecting a difference between the perfected log and the broadcast, and transmitting status information. | 2009-09-24 |
20090241143 | Method and System for Providing Set-Top Box Remote Access Functions in a Browser Extension - A method and a system for providing remote set-top box access functions in an Internet browser extension is disclosed. Web page content of a currently viewed web page is compared to an entertainment content database. The web page content is determined to be associated with entertainment content in the entertainment content database. Also, it is determined that there is a media manipulation action for the entertainment content, and a notification that the media manipulation action is available for the entertainment content is displayed. | 2009-09-24 |
20090241144 | INTERACTIVE TELEVISION SYSTEM WITH ONE-TOUCH RECORDING AND CONFLICT DETECTION FEATURES - A full service television system and method are provided. The system comprises a cable headend, at least one fiber transport, at least one distribution hub, at least one hybrid fiber coax plant, and a plurality of set-top terminals. The system delivers television programs, advanced cable services, and online services. Programs and services are transmitted to the set-top terminals in both digital and analog formats to maintain downward compatibility with existing systems. The set-top terminal includes a central processing unit, a unified memory architecture, a memory management unit, communications circuitry, I/O control circuitry, and audio and video output circuitry. Through these components, the set-top terminal provides advanced cable services such as a comprehensive channel navigator, an interactive program guide, one-touch recording, recording conflict detection and resolution, and advanced configuration controls. The set-top terminal also provides online services such as World Wide Web browsing, Internet e-mail, and home shopping. | 2009-09-24 |
20090241145 | SYSTEM AND METHOD FOR PROVIDING AN INTERACTIVE PROGRAM GUIDE HAVING DATE AND TIME TOOLBARS - Embodiments of the present disclosure are directed to a system and method for receiving a request for TV programming schedule information via an interactive programming guide, obtaining the TV programming schedule information associated with a period of time, displaying one or more program icons having the TV programming schedule information associated with the interactive programming guide; adjusting at least one of a date toolbar for selecting one or more dates and a time toolbar for selecting one or more time periods of a day in response to receiving one or more commands; and displaying the one or more program icons having the TV programming schedule information associated with the interactive programming guide based at least on one of the selected one or more dates and the selected one or more time periods of the day. | 2009-09-24 |
20090241146 | THREE-DIMENSIONAL ELECTRONIC PROGRAMMING GUIDE PROVIDING APPARATUS AND METHOD - An electronic programming guide (EPG) providing apparatus and method, in which an EPG is configured as a 3D form to facilitate a search for broadcasting program information included in the EPG. The EPG providing apparatus includes an EPG screen configuring unit and a control unit. The EPG screen configuring unit configures an EPG screen such that broadcasting program information is displayed on at least three faces of a 3D polyhedron. The control unit controls the EPG screen configuring unit to configure the BPG screen such that broadcasting program information corresponding to another broadcasting time zone or another broadcasting channel is displayed on the EPG screen based on a user input signal requesting a search for the broadcasting program information corresponding to another broadcasting time zone or another broadcasting channel. | 2009-09-24 |
20090241147 | METHOD OF TRANSMITTING LINK-ADAPTIVE TRANSMISSION OF DATA STREAM IN A MOBILE COMMUNICATION SYSTEM - A data transmitting method is disclosed. In transmitting A/V data stream in a transmitting device of a wireless network, the present invention includes transmitting the A/V data stream having a first data format to a receiving device, if a quality of a channel for carrying the A/V data stream to the receiving device is changed, deciding to change a data format of the A/V data stream to be transmitted to the receiving device into a second data format, and transmitting the A/V data stream having the second data format to the receiving device. | 2009-09-24 |
20090241148 | System and Method for Regulating Bandwidth in a Multicast Video Transmission System - A video transmitter can adaptively alter its transmission rate to plural receivers which receive video via multicast transmission. While the transmitter is initially in the “no tuning state,” the need for a video tune-up state change can be determined by calculating if the current generated A/V retry transmission rate is greater than the video tune-up start threshold and if it was triggered more than the video tune-up interval ago. If so, then the state can be set to “tuning up” and the retransmission rate can be increased by the video tune-up step, as shown in FIG. | 2009-09-24 |
20090241149 | Content reproduction system, remote control device, and computer program - A user uses a DMC (remote control device) | 2009-09-24 |
20090241150 | Method and System for Providing Set-Top Box Remote Access Functions in a Browser Extension Based on Advertising Metadata - A method and a system for providing remote set-top box access functions in an Internet browser extension based on advertisement metadata is disclosed. A meta-data tag associated with an advertisement embedded on a currently viewed web page is scanned. It is determined that the meta-data tag is related to entertainment content. A media manipulation action for the entertainment content is determined. A notification that the media manipulation action is available for the entertainment content is displayed. Controls to store the media manipulation action on a user account are provided, and the manipulation action is stored to the user account. | 2009-09-24 |
20090241151 | SYSTEMS AND METHODS FOR REMOTELY CONTROLLING A CONSUMER DEVICE - Systems and methods allow for the remote control of a personal video recorder (PVR), digital video recorder (PVR), set-top box (STB) or other consumer device that is capable of receiving programming via a high-bandwidth connection. A request is received from the customer for an action to be taken by the consumer device, wherein the request is received via a communications channel distinct from the high-bandwidth connection. The consumer device associated with the customer is identified in response to the request, and instruction is transmitted to the consumer device associated with the customer via the high-bandwidth connection to thereby direct the consumer device to carry out the action requested by the customer. | 2009-09-24 |
20090241152 | DIGITAL BROADCAST RETRANSMISSION APPARATUS AND METHOD - A receiver unit demodulates a digital broadcast wave and reproduces an MPEG2 transport stream. When a contents change is detected in the MPEG2 transport stream, a network processor adds identification information to the frame corresponding to the MPEG2 transport stream of the contents change. The MPEG2 transport stream to which the identification information is added is accumulated in a storage unit. A network processor reads out the MPEG2 transport stream making use of the identification information and transmits it to the IP network through a switch. | 2009-09-24 |
20090241153 | OPEN CABLE APPLICATION PLATFORM SET-TOP BOX (STB) PERSONAL PROFILES AND COMMUNICATIONS APPLICATIONS - Utilization of stored of personalized information and communication preferences in a profile in a STB in a structured format or via cookies allows at least a combination of feature rich telephony applications, with the personalized data stored in STBs facilitating feature rich communications sessions. Providing advanced multimedia communications applications using personalized data resident in STBs could allow an entity to provide, for example, many previously unavailable services, and therefore provide considerable new business potential. The personal information stored in the STB can convey many exemplary benefits, such as communication preferences, alternate contact modalities, payment preferences, priority preferences, trusted contacts, personal information, as well as multimedia messaging, etc. The integration of the personal information with the intelligent personal agent also enhances the user experience. | 2009-09-24 |
20090241154 | Method of processing data in internet protocol television receiver and internet protocol television receiver - A method of processing data in an IPTV receiver and such an IPTV receiver are disclosed. The method includes receiving location information necessary to acquire a content corresponding to a content reference identifier (CRID) by using the CRID, requesting an Internet protocol multimedia subsystem Gateway (IG) to transmit a session description protocol (SDP) file of the content, wherein the content is identified by the CRID and an instance metadata identifier (IMI), receiving the requested SDP file from the IG, and controlling a session setup for processing the content by using the received location information and the received SDP file. | 2009-09-24 |
20090241155 | Method and Apparatus to Facilitate Automatically Forming an Aggregation of Multiple Different Renderable Content Items - A network element ( | 2009-09-24 |
20090241156 | CONTENT REPRODUCING DEVICE - A portable content reproducing device according to the present invention is characterized in that: in the case where the communication status is good, a low bit rate stream file is recorded in a temporary recording device by using a communication band other than a communication band used for high bit rate reproduction; in the case where the communication status is poor or interrupted, a switchover is performed to reproduce a file stored in the temporary storing device from a point at which the communication is interrupted; and, in the case where the communication status is retrieved, high bit rate streaming reproduction is carried out. | 2009-09-24 |
20090241157 | CONTENT DISTRIBUTION SYSTEM, BAND CONTROL MEDIATING APPARATUS, AND BAND CONTROL METHOD - A content distribution system according to the present invention, includes a client terminal, a server, a band control mediating unit provided between the client terminal and the server, and configured to relay a reproduction control protocol data of a content data from the client terminal to the server, and a first band control unit arranged in a first network and configured to control a band on the first network. The band control mediating unit requests the first band control unit to control the band on the first network for a communication path, through which the content data is transferred, based on the reproduction control protocol data. | 2009-09-24 |
20090241158 | OPEN CABLE APPLICATION PLATFORM SET-TOP BOX (STB) PERSONAL PROFILES AND COMMUNICATIONS APPLICATIONS - Utilization of stored of personalized information and communication preferences in a profile in a STB in a structured format or via cookies allows at least a combination of feature rich telephony applications, with the personalized data stored in STBs facilitating feature rich communications sessions. Providing advanced multimedia communications applications using personalized data resident in STBs could allow an entity to provide, for example, many previously unavailable services, and therefore provide considerable new business potential. The personal information stored in the STB can convey many exemplary benefits, such as communication preferences, alternate contact modalities, payment preferences, priority preferences, trusted contacts, personal information, as well as multimedia messaging, etc. The integration of the personal information with the intelligent personal agent also enhances the user experience. | 2009-09-24 |
20090241159 | OPEN CABLE APPLICATION PLATFORM SET-TOP BOX (STB) PERSONAL PROFILES AND COMMUNICATIONS APPLICATIONS - Utilization of stored of personalized information and communication preferences in a profile in a STB in a structured format or via cookies allows at least a combination of feature rich telephony applications, with the personalized data stored in STBs facilitating feature rich communications sessions. Providing advanced multimedia communications applications using personalized data resident in STBs could allow an entity to provide, for example, many previously unavailable services, and therefore provide considerable new business potential. The personal information stored in the STB can convey many exemplary benefits, such as communication preferences, alternate contact modalities, payment preferences, priority preferences, trusted contacts, personal information, as well as multimedia messaging, etc. The integration of the personal information with the intelligent personal agent also enhances the user experience. | 2009-09-24 |
20090241160 | OPEN CABLE APPLICATION PLATFORM SET-TOP BOX (STB) PERSONAL PROFILES AND COMMUNICATIONS APPLICATIONS - Utilization of stored of personalized information and communication preferences in a profile in a STB in a structured format or via cookies allows at least a combination of feature rich telephony applications, with the personalized data stored in STBs facilitating feature rich communications sessions. Providing advanced multimedia communications applications using personalized data resident in STBs could allow an entity to provide, for example, many previously unavailable services, and therefore provide considerable new business potential. The personal information stored in the STB can convey many exemplary benefits, such as communication preferences, alternate contact modalities, payment preferences, priority preferences, trusted contacts, personal information, as well as multimedia messaging, etc. The integration of the personal information with the intelligent personal agent also enhances the user experience. | 2009-09-24 |
20090241161 | Method of processing data in internet protocol television receiver and internet protocol television receiver - A method of processing data in an IPTV receiver and such an IPTV receiver are disclosed. The method includes transmitting a request signal for resolution of a content reference identifier (CRID) corresponding to a content, receiving location information including a session description protocol (SDP) file, and a session initiation protocol-uniform resource identifier (SIP-URI) corresponding to the CRID, and controlling a session setup for processing a content by using the received SDP file. | 2009-09-24 |
20090241162 | Method of Processing Data in Internet Protocol Television Receiver and Internet Protocol Television Receiver - A method of processing data in an IPTV receiver and such an IPTV receiver are disclosed. The method includes transmitting a request signal for resolution of a content reference identifier (CRID) corresponding to a content, receiving location information including a session initiation protocol-uniform resource identifier (SIP-URI) and a session description protocol-uniform resource locator (SDP-URL), wherein the SIP-URI and the SDP-URL correspond to the CRID, requesting a server corresponding to the SDP-URL to transmit a session description protocol (SDP) file by using the received SDP-URL, and receiving the SDP file from the server. | 2009-09-24 |
20090241163 | BROADCAST PICTURE DISPLAY METHOD AND A DIGITAL BROADCAST RECEIVER USING THE SAME - A broadcast picture display method for a digital broadcast receiver is provided for displaying broadcast data during a channel switching period. The broadcast picture display method for digital broadcast receiver includes setting a switched-service channel in a channel switching period, buffering broadcast data received on the switched-service channel while displaying specific video data detected in the broadcast data as a still picture and playing video and audio data of the buffered broadcast data, when timestamp information is detected in the buffered broadcast data, in synchronization with each other on the basis of the timestamp information. | 2009-09-24 |
20090241164 | System and Method for Protecting Assets Using Wide Area Network Connection - A system, method, and program product is provided that detects whether a network adapter has been removed from a computer system. If the network adapter, such as a wireless network adapter, has been removed from the computer system, then a tamper evident indicator (e.g., bit) is set in a nonvolatile memory area of the computer system. In addition, a hard drive password is set to a different password according to a hard drive password policy. The hard drive password controls access to files stored on the hard drive. In one embodiment, the power-on password is also changed to a new password so that the user has to enter the new power-on password when initializing the computer system in order to access the files stored on the computer system. | 2009-09-24 |
20090241165 | COMPLIANCE POLICY MANAGEMENT SYSTEMS AND METHODS - In an exemplary system, a compliance policy processing subsystem is selectively and communicatively coupled to a rules management subsystem. The rules management subsystem is configured to maintain a rules database. The compliance policy processing subsystem is configured to facilitate selection by a user of a section of text within a compliance policy, direct the rules management subsystem to identify one or more rules within the rules database that are relevant to the section of text, and display a representation of the relevant rules. | 2009-09-24 |
20090241166 | Establishment of Security Federations - Secure interactions between administrative domains are modeled. The modeled process specifies role information for each of the administrative domains and interaction between the administrative domains. Role information associated with candidate administrative domains is received, and appropriate administrative domains from the candidate administrative domains are dynamically resolved based on the modeled process and the received role information. Trust realms between the dynamically resolved appropriate administrative domains are automatically derived based on the role information and the interactions from the modeled process. The secure interaction between the dynamically resolved appropriate administrative domains is effected through the automatically derived trust realms. | 2009-09-24 |
20090241167 | METHOD AND SYSTEM FOR NETWORK IDENTIFICATION VIA DNS - In embodiments of the present invention improved capabilities are described for accessing a DNS server, where the DNS server may be a DNS server within the control of a administrator. A pair of name and IP address may be stored on the DNS server. A client may then transmit the name to a DNS server to request the DNS server to lookup the IP address related to the client transmitted name. This client to DNS server communication may be performed as part of a network request from the client. The IP address may then be returned to the client in response to the connection request, which may allow the client to interpret the return of the security IP address as an indication of a known DNS server and therefore a known network. As a result, the client may then be able to set its security rules according to known network rules. Further, the identifying of a known network may be associated with location information associated with the DNS server, and thus the client, where the location information may be associated with multiple DNS IP address entries. | 2009-09-24 |
20090241168 | SYSTEM AND METHODS FOR PROTECTING CONFIDENTIAL INFORMATION ON NETWORK SITES BASED ON SECURITY AWARENESS - A system for protecting confidential information based upon user security awareness is provided. The system includes a network interface for connecting the system to a plurality of remotely-located network sites. The system also includes one or more processors on which at one or more data processing feature execute in response to a request received from a user of one of the remotely-located network sites. The system further includes a security-awareness module configured to execute in conjunction with the one or more processors for determining a measure of security awareness of the user, and for granting or denying the user access to the at least one data processing feature based upon the measure of security awareness. | 2009-09-24 |
20090241169 | AUTHENTICATION OF DEVICES IN A WIRELESS NETWORK - A method for authentication of devices (D | 2009-09-24 |
20090241170 | ACCESS, PRIORITY AND BANDWIDTH MANAGEMENT BASED ON APPLICATION IDENTITY - A method or system for managing packet flow is disclosed. The packets each include an inserted application identifier identifying a registered application. The method includes receiving packets destined for one or more resources, determining, by a packet processor, the inserted application identifier for each of the respective packets received and managing the packet flow of each received packet sent from a security node based at least in part on the inserted application identifier of the received packet. | 2009-09-24 |
20090241171 | WEARABLE COMPUTER SYSTEM AND METHOD CONTROLLING INFORMATION/SERVICE IN WEARABLE COMPUTER SYSTEM - A wearable system and a method for transferring and controlling information/service based on biologically generated information from a user are provided. In the method, an intuitive bio signal generated by a user is sensed and a device pointed by the sensed bio signal is selected. Then, bio signal information is created using the sensed bio signal and the generated bio signal information is transmitted to the selected device. After transmitting, the information/service is transferred to the selected device after confirming that the selected device that receives the bio signal information is activated. | 2009-09-24 |
20090241172 | Remote Disablement of a Communication Device - Systems, methods and computer readable media for remotely disabling communication devices. When a communication device is identified for disablement, a disable signal may be transmitted to the emergency communication device. If the emergency communication device receives the disable signal, the emergency communication device may authenticate the source of the disable signal. If the source of the disable signal has been authenticated, the emergency communication device may disable itself. Disablement may include physical destruction or physical alteration of hardware or software necessary for the communication device to operate. Disablement may also include being locked-out from access to or use of hardware or software necessary for the communication device to operate. | 2009-09-24 |
20090241173 | METHOD AND SYSTEM FOR PROTECTION AGAINST INFORMATION STEALING SOFTWARE - A system and method for identifying infection of unwanted software on an electronic device is disclosed. A software agent configured to generate a bait and is installed on the electronic device. The bait can simulate a situation in which the user performs a login session and submits personal information or it may just contain artificial sensitive information. Parameters may be inserted into the bait such as the identity of the electronic device that the bait is installed upon. The output of the electronic device is monitored and analyzed for attempts of transmitting the bait. The output is analyzed by correlating the output with the bait and can be done by comparing information about the bait with the traffic over a computer network in order to decide about the existence and the location of unwanted software. Furthermore, it is possible to store information about the bait in a database and then compare information about a user with the information in the database in order to determine if the electronic device that transmitted the bait contains unwanted software. | 2009-09-24 |
20090241174 | Handling Human Detection for Devices Connected Over a Network - A system and method for determining whether a user of a computer is a human, comprising: generating dynamic request code asking the user for information; sending the dynamic request code to the computer; receiving validation code as an answer to the dynamic request code; and determining whether or not the validation code was generated by a human. | 2009-09-24 |
20090241175 | METHODS AND SYSTEMS FOR USER AUTHENTICATION - The present invention relates to authentication, and in particular, to methods and systems for authenticating a user using electronic readable identifiers, networks, and data terminals. The user experience in accessing private accounts is enhanced while keeping such access secure from unauthorized individuals. | 2009-09-24 |
20090241176 | LOAD BALANCING IN SERVER COMPUTER SYSTEMS - Systems and methods to implement load balancing of connections to a server computer in a server collection are described. The server collection receives connection requests from remote clients over a network. A session broker evaluates one or more load parameters of the server computers in the server collection and, based on those load parameters, determines load associated with each server computer. The session broker redirects the connection requests to the server computer which has a lesser load. | 2009-09-24 |
20090241177 | SECURITY SYSTEM FOR A COMMUNITY BASED MANAGED HEALTH KIOSK SYSTEM - The present invention is directed to security systems for community based managed health kiosk systems, and more particularly to protecting the privacy of a user's health information originally obtained at a community-based kiosk system. The disclosed security systems can be combined with community based managed health kiosk systems to enable a patient, or user, to obtain knowledge of his or her health condition/status and to obtain health services from remotely located health care professionals without risk of dissemination of confidential personal health information and records. | 2009-09-24 |
20090241178 | CARDSPACE HISTORY VALIDATOR - Before a relying party grants a client access to a resource, the last use of the security token by the client to access the resource of the relying party can be verified. Verification can be accomplished by comparing the last time the client sent the security token to the relying party with the last time the relying party received the security token from the client. If the last use of the security token is not verified, the possibility exists that the security token has been fraudulently used by a third party. | 2009-09-24 |
20090241179 | Enabling peripheral communication in a local area network - In one embodiment, the present invention includes a component to be coupled to a peripheral device to enable the peripheral device to appear to be locally connected to a computer of a local area network, although the peripheral device is not physically connected to the computer. The component may include a first set of registers to store a mirrored copy of control register information present in a second set of registers of a host controller interface of the computer. Other embodiments are described and claimed. | 2009-09-24 |
20090241180 | System and Method for Data Transport - A data agnostic transport system that may be used for data objects such as email, calendar, notes, files, and multimedia. | 2009-09-24 |
20090241181 | Method for optimizing nsis signaling in mobike-based mobile applications - A method reduces signaling overhead of a mobile node that maintains at least one active Next Steps in Signaling session. The mobile node has a MOBIKE connection to a virtual private network gateway, and changes its link to the Internet. At least the IP address of the VPN gateway and/or an address space corresponding to the subnetwork of the VPN gateway is/are inserted into the message routing information object contained in the NSIS message. A value is defined for a security parameter index. The SPI value is inserted into the MRI object. The S flag is set in the MRI object. An address space that refers to the IP address of the mobile node is inserted into the MRI object. | 2009-09-24 |
20090241182 | System and Method for Implementing a One Time Password at an Information Handling System - A system and method are provided which substantially reduce the disadvantages and problems associated with previous methods and systems for generating an OTP at an information handling system. An OTP is generated at an information handling system hardware or firmware layer upon detection of a predetermined input trigger, such as a key combination. The OTP is provided for authentication independent of an operating system or applications running on the information handling system. | 2009-09-24 |
20090241183 | DYNAMIC DOCUMENT MERGING METHOD AND SYSTEM - A document merging method and system. The method includes receiving by a computing system from a first user, a plurality of documents and a command for tagging portions of each document according to various parameters. The computing system assigns identification tags to the portions of each document. The computing system receives from a second user, a command for generating a merged document. The computing system receives a selection of a first identification tag associated with a first document and a selection of a second identification tag associated with a second document. The computing system generates a merged document comprising a first portion of the first document and said second portion of the second document. The computing system stores the merged document. | 2009-09-24 |
20090241184 | METHOD FOR GENERATING ACCESS DATA FOR A MEDICAL DEVICE - A method for generating an access code to a medical device including a memory for patient data, the access code being valid only once. According to the method, a query key is generated from a device-internal identification and is transmitted to an authorization entity. The authorization entity generates an associated release key from the query key. The release key grants access and modifies the internal identification when the release key is entered into the device such that the access code cannot be used a second time. | 2009-09-24 |
20090241185 | SECURE PASSWORD ENTRY - A method, system, and program defeating unauthorized keystroke logging during password entry are provided. Secure password entry is facilitated by displaying a password prompt comprising a changing stream of random characters, where a particular character within the stream of random characters is displayed at a visibly detectable higher frequency. A user selects a password character by entering input to increment or decrement the particular high frequency character to reach the password character, such that any unauthorized keystroke logging to detect said password is ineffective. Once the user reaches the password character, the user provides another input indicating a selection of the current high frequency character as the password character. Once the user has selected all the characters of the password, the user enters an input indicating the password is complete and the password entry controller then passes the password to the calling layer. | 2009-09-24 |
20090241186 | Method for removable element authentication in an embedded system - The present invention proposes a method for protecting and monitoring removable entities in an embedded system. In accordance with the present invention, prior to insertion of a removable entity in the embedded system, a user registers details of the removable entity in the device host. The details may be entered after entering a password or a PIN. A registration identification is calculated based on an algorithm in the device host and is then stored in the host. After the removable entity is inserted, it is registered in an unalterable area (e.g. flash memory) of the device host. Information such as the category of the removable entity, a device number, etc. may be exchanged between the device host and the removable entity. The device host then computes a registration identification based on a Removable Entity Registration Algorithm. The identifications are then compared, and the device host displays the details of the removable entity to the user. | 2009-09-24 |
20090241187 | METHOD AND SYSTEM FOR PROTECTION AGAINST INFORMATION STEALING SOFTWARE - A system and method for identifying infection of unwanted software on an electronic device is disclosed. A software agent configured to generate a bait and is installed on the electronic device. The bait can simulate a situation in which the user performs a login session and submits personal information or it may just contain artificial sensitive information. Parameters may be inserted into the bait such as the identity of the electronic device that the bait is installed upon. The output of the electronic device is monitored and analyzed for attempts of transmitting the bait. The output is analyzed by correlating the output with the bait and can be done by comparing information about the bait with the traffic over a computer network in order to decide about the existence and the location of unwanted software. Furthermore, it is possible to store information about the bait in a database and then compare information about a user with the information in the database in order to determine if the electronic device that transmitted the bait contains unwanted software. | 2009-09-24 |
20090241188 | COMMUNICATION MONITORING APPARATUS AND COMMUNICATION MONITORING METHOD - A communication monitoring apparatus includes a session extracting unit which extracts a packet in a session established between a pair of a transmitting device and a receiving device from a plurality of packets, a lead-packet extracting unit which extracts a lead packet including control information on communication between the transmitting device and the receiving device from the packet, a storage unit in which an unauthorized signature is stored, a verification unit which performs verification between the lead packet and the unauthorized signature, and an output unit which supplies a monitoring result indicating that the session extracted by the session extracting unit is an unauthorized communication when the lead packet includes a portion matched with the unauthorized signature. | 2009-09-24 |
20090241189 | EFFICIENT HANDLING OF INTERRUPTS IN A COMPUTING ENVIRONMENT - A method for efficiently handling interrupts in a virtual technology environment with integrity services is provided. The method comprises assigning an interrupt to a virtual machine that is running a software agent; suspending the software agent; invoking a protected interrupt handler; copying the interrupt's memory content to a protected location, in response to successfully verifying the integrity of the content; replacing the interrupt's return address with a return address for a protected function; switching from the software agent's protected context to its active context; executing the original interrupt handler; returning control to the protected function to ensure that execution of the software agent resumes safely; switching back to the software agent's protected context, in response to successfully verifying the integrity of the content; and passing control back to the software agent to resume execution. | 2009-09-24 |
20090241190 | System and method for securing a network from zero-day vulnerability exploits - A method of securing a network from vulnerability exploits, including the steps of a traffic analysis engine receiving a plurality of packets destined for an internal operating system; the traffic analysis engine selectively forwarding the packets to at least one virtual machine emulating the internal operating system; the virtual machine processing each forwarded packet; a rapid analysis engine identifying a malicious packet from the processed packets; and the rapid analysis engine creating a new signature to identify the malicious packet. | 2009-09-24 |
20090241191 | SYSTEMS, METHODS, AND MEDIA FOR GENERATING BAIT INFORMATION FOR TRAP-BASED DEFENSES - Systems, methods, and media for generating bait information for trap-based defenses are provided. In some embodiments, methods for generating bait information for trap-based defenses include: recording historical information of a network; translating the historical information; and generating bait information by tailoring the translated historical information. | 2009-09-24 |
20090241192 | VIRTUAL MACHINE CONFIGURATION SHARING BETWEEN HOST AND VIRTUAL MACHINES AND BETWEEN VIRTUAL MACHINES - In embodiments of the present invention improved capabilities are described for conserving computer resources by processing data through the use of a first virtual machine, causing the first virtual machine to share information about the processing of the data with a second virtual machine, and causing the second virtual machine to alter an activity as a result of the shared information, causing the host to share the information with a second virtual machine to alter an activity of the second virtual machine, causing the first virtual machine to share information about the action with a second virtual machine to alter a process of the second virtual machine, and the like. | 2009-09-24 |
20090241193 | Enhanced Computer Intrusion Detection Methods And Systems - Improved intrusion detection and/or tracking methods and systems are provided for use across various computing devices and networks. Certain methods, for example, form a substantially unique audit identifier during each authentication/logon process. One method includes identifying one or more substantially unique parameters that are associated with the authentication/logon process and encrypting them to form at least one audit identifier that can then be generated and logged by each device involved in the authentication/logon process. The resulting audit log file can then be audited along with similar audit log files from other devices to track a user across multiple platforms. | 2009-09-24 |
20090241194 | VIRTUAL MACHINE CONFIGURATION SHARING BETWEEN HOST AND VIRTUAL MACHINES AND BETWEEN VIRTUAL MACHINES - In embodiments of the present invention improved capabilities are described for presenting a physical computing machine including a virtual computer machine monitor and a one or more of virtual computing machines, where each of the virtual computing machines runs its own operating system, presenting one of the multiple virtual computing machines as a host, and the remaining multiple virtual computing machines as guests, and providing for a virtual machine protected environment, where suspicious file information is shared between the virtual machine protected environment and other virtual machines. | 2009-09-24 |
20090241195 | DEVICE AND METHOD FOR PREVENTING VIRUS INFECTION OF HARD DISK - A device and a method for preventing virus infection of a hard disk are provided. The virus infection preventing device includes a storage media, a read-only memory, a control circuit and a switch. The virus infection preventing method includes steps of generating either a first signal or a second signal by a switch, and receiving a write command. If the write command allows data to be written into a boot sector of the hard disk and the first signal is generated by the switch, the write command is aborted. Whereas, if the write command allows data to be written into the boot sector of the hard disk and the second signal is generated by the switch, the write command is executed. | 2009-09-24 |
20090241196 | METHOD AND SYSTEM FOR PROTECTION AGAINST INFORMATION STEALING SOFTWARE - A system and method for identifying infection of unwanted software on an electronic device is disclosed. A software agent configured to generate a bait and is installed on the electronic device. The bait can simulate a situation in which the user performs a login session and submits personal information or it may just contain artificial sensitive information. Parameters may be inserted into the bait such as the identity of the electronic device that the bait is installed upon. The output of the electronic device is monitored and analyzed for attempts of transmitting the bait. The output is analyzed by correlating the output with the bait and can be done by comparing information about the bait with the traffic over a computer network in order to decide about the existence and the location of unwanted software. Furthermore, it is possible to store information about the bait in a database and then compare information about a user with the information in the database in order to determine if the electronic device that transmitted the bait contains unwanted software. | 2009-09-24 |
20090241197 | SYSTEM AND METHOD FOR ANALYSIS OF ELECTRONIC INFORMATION DISSEMINATION EVENTS - A system and method for determining an intent of a sender in transmitting electronic information in order to prevent unauthorized dissemination of electronic information is disclosed. The system and method facilitate cost-effective handling of dissemination events and comprise a traffic analyzer configured to analyze descriptors of the electronic information and parameters of the transmission of the electronic information in order to determine the intent of the sender. By determining the intent of the sender, it is possible to effectively quarantine the electronic information before it is disseminated. | 2009-09-24 |
20090241198 | INAPPROPRIATE CONTENT DETERMINATION APPARATUS, CONTENT PROVISION SYSTEM, INAPPROPRIATE CONTENT DETERMINATION METHOD, AND COMPUTER PROGRAM - An SNS system | 2009-09-24 |
20090241199 | SYSTEMS AND METHODS FOR CREATING, MANIPULATING AND PROCESSING RIGHTS AND CONTRACT EXPRESSIONS USING TOKENIZED TEMPLATES - System and methods for manipulating rights expressions for use in connection with a rights management system include one or more tokenized templates. Each tokenized template includes one or more rights expression language statements and one or more tokens associated with at least one of the rights expression language statements. Further, the tokens can be place holders for data items or rights expression elements. The system further includes a license template module that creates the tokenized templates, and a license instance creation module that replaces at least one of the tokens in one or more selected license templates with one or more of the data items or rights expression elements to generate a license instance. Additionally, the system includes a license instance analysis module having sub-modules for validating and interpreting license instances, and a data parsing module for extracting data from created license instances. | 2009-09-24 |
20090241200 | SECURITY MEMORY DEVICE AND METHOD FOR MAKING SAME - A security memory device includes a memory cell array that stores a plurality of contents, including a mine, which is stored as a portion of the plurality of contents. The mine is triggered when it is accessed, typically such that the mine erases the memory contents. Also, control logic is included that controls access to the plurality of contents. In one aspect, the memory cell array can include a protected-cell zone and a free-cell zone. In this aspect, the security memory device can further include a lock that provides protection for contents stored in the protected-cell zone from access and a key that is capable of unlocking the lock. | 2009-09-24 |
20090241201 | TECHNIQUES FOR MULTILINGUAL PASSWORD CHALLENGE RESPONSE, PASSWORD RESET, AND/OR PASSWORD RECOVERY - Techniques for multilingual password challenge response, password reset, and/or password recovery are presented. When a password reset or password recovery request is received, a series of challenge questions are serially asked such that each question has to be answered correctly before the next question in the series is even presented. Furthermore, at least two questions are asked in different languages from one another. | 2009-09-24 |
20090241202 | DOMAIN-GRAFTED ANTIBODIES - The present invention relates to antibodies. Specifically, the present invention relates to antibodies composed of novel combinations of inter-species antibody domains (“domain-grafted antibodies”). The present invention further relates to compositions comprising such domain-grafted antibodies, as well as methods for producing such domain-grafted antibodies. Finally, the present invention relates to methods of evaluating the in vivo biological effect of such domain-grafted antibodies as well as uses of such domain-grafted antibodies for cross-species evaluation of the in vivo activity antibodies intended for human therapy. | 2009-09-24 |
20090241203 | Transgenic animal models of disease - The present invention provides transgenic, large non-human animal models of diseases and conditions, as well as methods of making and using such animal models in the identification and characterization of therapies for the diseases and conditions. | 2009-09-24 |
20090241204 | TRANSGENIC NON-HUMAN ANIMALS FOR PHARMACOLOGICAL AND TOXICOLOGICAL STUDIES - The present invention is directed to the production, breeding and use of transgenic non-human animals such as mice in which specific genes or portions of genes have been replaced by homologues from another animal to make the physiology of the animals so modified more like that of the other animal with respect to drug pharmacokinetics and metabolism. The invention also extends to the use of the genetically modified non-human animals of the invention for pharmacological and/or toxicological studies. | 2009-09-24 |
20090241205 | METHOD FOR IDENTIFYING CRMP MODULATORS - The present invention refers to a method for identifying a modulator of CRMP suitable for the prevention, alleviation or/and treatment of CRMP-associated diseases. | 2009-09-24 |
20090241206 | METHODS FOR CLONING FERRETS AND TRANSGENIC FERRET MODELS FOR DISEASES - The invention provides a transgenic Mustelidae in which a gene associated with a human disease or condition comprises a targeted genetic modification, and uses thereof. Also provided is a method to cryopreserve Mustelidae embryos or cells, and to enhance the number of live offspring from cryopreserved Mustelidae embryos. | 2009-09-24 |
20090241207 | Expression of heterologous genes according to a targeted expression profile - A gene trap vector comprises a DNA construct containing an expression unit of an internal ribosome binding site (IRES) coupled to a heterologous gene sequence; this expression unit is used in gene trap protocols to obtain expression of the heterologous gene in the host. | 2009-09-24 |
20090241208 | NUCLEOTIDE SEQUENCES AND POLYPEPTIDES ENCODED THEREBY USEFUL FOR MODIFYING PLANT CHARACTERISTICS IN RESPONSE TO COLD - Methods and materials for modulating cold tolerance levels in plants are disclosed. For example, nucleic acids encoding cold tolerance-modulating polypeptides are disclosed as well as methods for using such nucleic acids to transform plant cells. Also disclosed are plants having increased levels of cold tolerance and plant products produced from plants having increased cold tolerance levels. | 2009-09-24 |
20090241209 | HIGH LYCOPENE CONTENT TOMATO PLANTS AND MARKERS FOR USE IN BREEDING FOR SAME - plants which are exceptionally high in fruit lycopene content (˜300-390 μg lycopene/g fresh fruit) are disclosed herein, which may be used in plant breeding to make the tomato plants of the present invention. The invention also discloses genetic markers, which are associated with the trait which may be used in marker-assisted selection for development of plants, lines, or varieties with the trait. | 2009-09-24 |
20090241210 | COTTON VARIETY 779020G - The invention relates to the novel cotton variety designated 779020G. Provided by the invention are the seeds, plants, plant parts and derivatives of the cotton variety 779020G. Also provided by the invention are tissue cultures of the cotton variety 779020G and the plants regenerated therefrom. Still further provided by the invention are methods for producing cotton plants by crossing the cotton variety 779020G with itself or another cotton variety and plants produced by such methods. | 2009-09-24 |
20090241211 | COTTON VARIETY 303308G - The invention relates to the novel cotton variety designated 303308G. Provided by the invention are the seeds, plants, plant parts and derivatives of the cotton variety 303308G. Also provided by the invention are tissue cultures of the cotton variety 303308G and the plants regenerated therefrom. Still further provided by the invention are methods for producing cotton plants by crossing the cotton variety 303308G with itself or another cotton variety and plants produced by such methods. | 2009-09-24 |
20090241212 | COTTON VARIETY 468300G - The invention relates to the novel cotton variety designated 468300G. Provided by the invention are the seeds, plants, plant parts and derivatives of the cotton variety 468300G. Also provided by the invention are tissue cultures of the cotton variety 468300G and the plants regenerated therefrom. Still further provided by the invention are methods for producing cotton plants by crossing the cotton variety 468300G with itself or another cotton variety and plants produced by such methods. | 2009-09-24 |
20090241213 | COTTON VARIETY 565452G - The invention relates to the novel cotton variety designated 565452G. Provided by the invention are the seeds, plants, plant parts and derivatives of the cotton variety 565452G. Also provided by the invention are tissue cultures of the cotton variety 565452G and the plants regenerated therefrom. Still further provided by the invention are methods for producing cotton plants by crossing the cotton variety 565452G with itself or another cotton variety and plants produced by such methods. | 2009-09-24 |
20090241214 | Markers For Aphid Resistant Germplasm In Soybean Plants - The present invention relates to compositions and methods for providing and using markers of aphid resistant germplasm, particularly for identifying aphid resistance germplasm in soybean plants. Specifically, the inventions related to providing aphid resistant germplasm identified by markers associated with decreased damage from aphid feeding, as well as enhanced tolerance to aphid infestation of soybean plants. More particularly, the invention relates to compositions and methods for using genetic markers in breeding methods for producing plants with increased resistance to aphid damage and tolerance, while retaining and acquiring desired agronomic traits, Furthermore, the invention relates to plants produced by these breeding programs for use in commercial soybean production. | 2009-09-24 |
20090241215 | USE OF ARMADILLO REPEAT (ARM1) POLYNUCLEOTIDES FOR OBTAINING PATHOGEN RESISTANCE IN PLANTS - The invention relates to a method of generating or increasing a pathogen resistance in plants by reducing the expression of at least one Armadillo repeat polypeptide or a functional equivalent thereof. The invention relates to novel nucleic acid sequences coding for a | 2009-09-24 |
20090241216 | Proteins Involved in After-Cooking Darkening in Potatoes - Proteins that are associated with increased after-cooking darkening (ACD) are described. The proteins are useful in diagnostic assays for detecting ACD. Inhibiting or activating the proteins can also be useful in controlling and/or reducing ACD. | 2009-09-24 |
20090241217 | Yield-improved transgenic plants - Disclosed herein are transgenic plants having a recombinant DNA construct which expresses a Hap3 transcription factor which provides enhanced resistance and/or tolerance to water deficit. More specifically the DNA constructs comprise a polynucleotide which encodes at least a functional part of a transcription factor that is a CCAAT-box DNA binding subunit or a homologous transcription factor. | 2009-09-24 |
20090241218 | PLANTS HAVING ENHANCED YIELD-RELATED TRAITS AND A METHOD FOR MAKING THE SAME - The present invention relates generally to the field of molecular biology and concerns a method for improving various plant growth characteristics by modulating expression in a plant of a nucleic acid encoding a GRP (Growth-Related Protein). The present invention also concerns plants having modulated expression of a nucleic acid encoding a GRP, which plants have improved growth characteristics relative to corresponding wild type plants or other control plants. The invention also provides constructs useful in the methods of the invention. The GRP may be one of the following: Extensin Receptor-Like Kinase (ERLK), F-Box WD40 (FBXW) polypeptide, RAN-Binding Protein (RANBP), Golden2-like Transcription Factor (GLK), REV delta homeodomain leucine zipper domain polypeptide, CLE protein, and Seed Yield Regulator (SYR) protein. | 2009-09-24 |
20090241219 | GDC-2 GENES CONFERRING HERBICIDE RESISTANCE - Compositions and methods for conferring herbicide resistance to plants, plant cells, tissues and seeds are provided. Compositions comprising a coding sequence for a polypeptide that confers resistance or tolerance to glyphosate herbicides are provided. The coding sequences can be used in DNA constructs or expression cassettes for transformation and expression in plants. Compositions also comprise transformed plants, plant cells, tissues, and seeds. In particular, isolated nucleic acid molecules corresponding to glyphosate resistant nucleic acid sequences are provided. Additionally, amino acid sequences corresponding to the polynucleotides are encompassed. In particular, the present invention provides for isolated nucleic acid molecules comprising nucleotide sequences encoding the amino acid sequence shown in SEQ ID NO:3 or the nucleotide sequences set forth in SEQ ID NOS:1 and 2. | 2009-09-24 |
20090241220 | Nucleic Acid Molecules and Other Molecules Associated with Plants - Expressed Sequence Tags (ESTs) isolated from soybean are disclosed. The ESTs provide a unique molecular tool for the targeting and isolation of novel genes for plant protection and improvement. The disclosed ESTs have utility in the development of new strategies for understanding critical plant developmental and metabolic pathways. The disclosed ESTs have particular utility in isolating genes and promoters, identifying and mapping the genes involved in developmental and metabolic pathways, and determining gene function. Sequence homology analyses using the ESTs provided in the present invention, will result in more efficient gene screening for desirable agronomic traits. An expanding database of these select pieces of the plant genomics puzzle will quickly expand the knowledge necessary for subsequent functional validation, a key limitation in current plant biotechnology efforts. | 2009-09-24 |
20090241221 | TANDEM REAPEAT DNA CONSTRUCTS PRODUCING PROTEINS THAT ATTACK PLANT PATHOGENIC VIRUSES, FUNGI, AND BACTERIA BY DISRUPTING TRANSCRIPTION FACTORS ESSENTIAL FOR REPLICATION THEREOF IN PLANTS - Methods and compositions reduce growth of Geminiviruses employing a compound with the following structure: | 2009-09-24 |
20090241222 | TANDEM REAPEAT DNA CONSTRUCTS PRODUCING PROTEINS THAT ATTACK PLANT PATHOGENIC VIRUSES, FUNGI, AND BACTERIA BY DISRUPTING TRANSCRIPTION FACTORS ESSENTIAL FOR REPLICATION THEREOF IN PLANTS - Methods and compositions reduce growth of Geminiviruses employing a compound with the following structure: | 2009-09-24 |
20090241223 | MODULATING PLANT SUGAR LEVELS - This document provides methods and materials related to plants having modulated (e.g., increased) levels of sugars (e.g., glucose, fructose, and/or sucrose). For example, this document provides plants having increased sugar levels as well as methods and materials for making plants and plant products having increased sugar levels. | 2009-09-24 |
20090241224 | Rubisco Activase with Increased Thermostability and Methods of Use Thereof - The present invention provides thermostable polypeptides related to | 2009-09-24 |
20090241226 | Gene Encoding Lignan Methylation Enzyme - The present invention relates to genes for enzymes having the activity of transferring a methyl group to lignans, plants with an altered lignan composition using these methyltransferases, and so on. More particularly, the present invention relates to enzyme genes having the activity of synthesizing methylated lignans, preferably enzyme genes having the activity of synthesizing sesame-derived methylated lignans, and use thereof. | 2009-09-24 |