50th week of 2009 patent applcation highlights part 70 |
Patent application number | Title | Published |
20090307727 | PACKET REFORMATTING FOR DOWNSTREAM LINKS - Systems, devices, and methods are described for formatting packets for downstream satellite links. The generation of a broadband wireless signal is described, the signal to be transmitted between a gateway and subscriber terminals via satellite. Respective data link layer addresses for the subscriber terminals may each be associated with one or more shortened identifiers for use in lieu of the associated data link layer addresses. This addressing may be included in a stream encapsulation header for an appended data packet. One or more such headers and their appended data packets may then be encapsulated in a baseband frame for transmission within a physical layer frame. Data packets may be fragmented across physical layer frames, and a range of novel formatting techniques may be used to implement the fragmentation. | 2009-12-10 |
20090307728 | SYSTEMS AND METHODS FOR WIRELESSLY TRANSMITTING TELEVISION CONTENT RECEIVED VIA A SATELLITE ANTENNA - Systems and methods allow for wirelessly providing television content from a satellite antenna to a television. An antenna is configured to receive a satellite broadcast signal that includes the television content, and a demodulator coupled to the antenna demodulates the received satellite broadcast signal. A wireless transmitter coupled to the demodulator transmits at least a portion of the demodulated satellite broadcast signal across a wireless connection to thereby allow viewing of the television content on the television. | 2009-12-10 |
20090307729 | MOBILE ENTERTAINMENT SYSTEM WITH RETRIEVAL OF AUDIO AND VIDEO MEDIA CONTENT FROM A REMOTE LIBRARY - A mobile entertainment system includes a video system in combination with a media source. The video system and media source are housed within a housing secured within an automobile. The media source includes a storage medium upon which audio and video media content is stored for display upon the video system as desired by a user. A wireless global communication network access point is mounted within the automobile, wherein the media source includes wireless communication capabilities permitting communication with the wireless global communication network access point for retrieval of audio and video media content for display upon the video monitor. A remote library of audio and video media content is in wireless communication with the media source via the wireless access point. The remote library includes storage space for uploading of media content from a personal collection of audio and video media content from a user for subsequent transmission to the media source upon synchronization of the remote library with the media source thereby providing the user with access to a personal collection of audio and video content media. An access approval code is associated with the media source instructing the remote library to synchronize the audio and video media content with the media source as desired by the user. | 2009-12-10 |
20090307730 | MEDIA ENHANCEMENT MODULE - A media enhancement module ( | 2009-12-10 |
20090307731 | PREDICTIVE CONTENT PRESENTATION - A system may automatically send a request for a list of programs over a network, obtain, in response to the request, a user profile that includes a list of programs that a viewer has accessed, send information identifying at least one of the programs over the network, and output the at least one of the programs to a preview window of a display. | 2009-12-10 |
20090307732 | Personalized Insertion of Advertisements in Streaming Media - Apparatus ( | 2009-12-10 |
20090307733 | DOWNLOADING METHOD AND APPARATUS OF TERMINAL ENTITY - Provided are downloading methods and apparatuses related to a terminal entity presenting an event related to at least one download item related to an Internet protocol television (IPTV) service. | 2009-12-10 |
20090307734 | COMMUNICATION DEVICE FOR PROVIDING COMMUNICATION BETWEEN ELECTRONIC APPARATUSES - A communication device includes: a first communication module configured to perform a first communication with a counterpart communication device using a first set of communication lines; a second communication module configured to confirm with the counterpart communication device using a second set of communication lines whether the counterpart communication device is capable of establishing a second communication; a storage module configured to store information related to an extended communication capability provided in the counterpart communication device; and a controller configured to establish a third communication with the counterpart communication device based on the information stored in the storage module when the second communication module confirms that the counterpart communication device is capable of establishing the second communication. | 2009-12-10 |
20090307735 | SPLIT PERSONAL COMPUTER SYSTEM - A cable television interface box for interconnecting a television display unit to a cable television connection. The cable television interface box includes a television accessory unit in communication with the television display unit and the cable television connection. The television accessory unit interfaces with a remote portion of a split personal computer system and outputs input data signals to the remote portion for performing input portions of personal computer tasks, and receives video signals from the remote portion indicative of video and output portions of personal computer tasks. | 2009-12-10 |
20090307736 | METHOD AND BROWSER FOR PROVIDING IPTV TO MULTIPLE IMS USERS - A method and terminal for providing Internet Protocol Television (IPTV) and other communication services to a group of users, such as a family, using an IP Multimedia Subsystem (IMS) network. A group private user identity is associated with a group public user identity and with a plurality of individual public user identities, each of which is associated with a different user in the group. Utilizing the group private User ID and the group public User ID, a browser registers a group subscription with the IMS network. When an individual user enters an identifier such as a PIN, the individual is then registered with the IMS network, while maintaining the group registration with the IMS network and the IPTV network. Individual users can be changed without having to restart the browser. | 2009-12-10 |
20090307737 | WEB TELEVISION HAVING A TWO-WAY COMMUNICATION BUS INTERCONNECTING A TELEVISION CONTROLLER AND INTERNET MODULE - A web television includes a display, a tuner, an internet module, and a PIP module. The tuner is arranged to select television video for display on the display and to select television audio for display by a speaker of the web television. The internet module is arranged to supply internet video for display on the display and to supply internet audio for display by the speaker of the web television, and the internet video and audio are derived from internet communications between the web television and internet content providers. The PIP module is arranged to provide a PIP area within a main area of the display. The internet video and the television video may be swapped between the PIP area and the main area of the display, and the speaker of the web television may be swapped between the internet audio and the television audio. | 2009-12-10 |
20090307738 | Web television having a two-way communication bus interconnecting a television controller and an internet module - A web television includes a display, a tuner, an internet module, and a PIP module. The tuner is arranged to select television video for display on the display and to select television audio for display by a speaker of the web television. The internet module is arranged to supply internet video for display on the display and to supply internet audio for display by the speaker of the web television, and the internet video and audio are derived from internet communications between the web television and internet content providers. The PIP module is arranged to provide a PIP area within a main area of the display. The internet video and the television video may be swapped between the PIP area and the main area of the display, and the speaker of the web television may be swapped between the internet audio and the television audio. | 2009-12-10 |
20090307739 | REMOTE DISTRIBUTED ANTENNA - Methods and apparatus are described for configuring a CATV system as base station with a distributed antenna supporting a wireless communication system. The CATV system can be configured to implement a frequency translating repeater at each of a plurality of distribution points within the CATV distribution network. | 2009-12-10 |
20090307740 | METHOD AND APPARATUS FOR SELECTIVE CACHING OF BURST STREAM TRANSMISSION - Embodiments relate to systems and methods for the selective caching of burst stream transmissions. A digital video (e.g., DVB-H) or other transport stream can be received on a cellular telephone or other device. The transport stream can be divided into bursts in a sequence of cyclical time slots, each slot carrying one service such as a video channel. The bursts contained in the time slots most distant in time from a currently received time slot can be stored to an onboard cache. When a user wishes to change the service being played, they can select the new desired service. If the user chooses to switch or “zap” to one of the cached services, the media decoder on the device can immediately begin decoding and playing the service encoded in that burst back, rather than waiting for the arrival of the next time slot of the subsequent burst for that service. | 2009-12-10 |
20090307741 | METHODS AND APPARATUS FOR DIVIDING AN AUDIO/VIDEO STREAM INTO MULTIPLE SEGMENTS USING TEXT DATA - Various embodiments of apparatus and/or methods are described for identifying multiple segments of content in a recorded audio/video stream. Thus, an audio/video stream may be segmented into various logical chapters, scenes or other sections and the like. The segments of the audio/video stream may then be selectably viewed by a user. A DVR presents the selected segments and automatically skips over the undesignated segment of the audio/video stream. | 2009-12-10 |
20090307742 | Indexing of Security Policies - In one embodiment, a computer implemented method for indexing security policies is provided. The computer implemented method determines a policy vocabulary to form a set of policy elements, and creates an index from the set of policy elements. The computer implemented method further receives a request to form requested policy elements, locates requested policy elements in the index to form a set of returned policy elements, and identifies a rule for use with the returned policy elements. | 2009-12-10 |
20090307743 | METHOD TO AUTOMATICALLY MAP BUSINESS FUNCTION LEVEL POLICIES TO IT MANAGEMENT POLICIES - A method, system, computer program product, and computer program storage device for transforming a high-level policy associated with a high layer to a low-level policy associated with a low layer. Mapping between high-level objects in a high layer and low-level objects in a low layer is derived by an automated discovery tool. The high-level policy is mapped to the low-level policy according to the mapping (e.g., by substituting the high-level objects with the low-level objects and by performing a syntax transformation). In one embodiment, a low-level policy is transformed to a high-level policy according to the mapping. As exemplary embodiments, policy transformations in traffic shaping and data retention are disclosed. | 2009-12-10 |
20090307744 | AUTOMATING TRUST ESTABLISHMENT AND TRUST MANAGEMENT FOR IDENTITY FEDERATION - A federated identity verification system includes an identity provider that provides security tokens ultimately to one or more relying parties for access by the client to services at a relying party. Specifically, the relying party can validate the security token from an identity provider (whether directly or via a client) when verifying that the received security token conforms to security configuration data previously exchanged with the identity provider. To establish the trust relationship, the identity provider and one or more relying parties exchange security configuration information through an agreed-to communication channel. The security configuration information indicates the settings that the other party needs to use for establishing, maintaining, and/or monitoring the trust relationship. The communication channel allows both parties to flexibly and continually synchronize changes to security configurations, and thus maintain, change, or end the trust relationship automatically, as desired. | 2009-12-10 |
20090307745 | DOCUMENT MANAGEMENT APPARATUS, POLICY SERVER, METHOD FOR MANAGING DOCUMENT, METHOD FOR CONTROLLING POLICY SERVER, AND COMPUTER-READABLE RECORDING MEDIUM - A document management apparatus is included in a document management system having a policy server which issues a policy corresponding to a right to access a document. The document management apparatus has an access-right description determination unit configured to collate first data input in the document with an access-right description defined in accordance with second data input in the document in advance, and determine the access-right description for the document in which the first data is input in accordance with a result of the collation, a requesting unit configured to request the policy server to issue the policy in accordance with the access-right description determined using the access-right description determination unit, and an applying unit configured to apply the policy issued by the policy server to the document in which the first data is input. | 2009-12-10 |
20090307746 | METHOD, SYSTEM AND DEVICE FOR IMPLEMENTING SECURITY CONTROL - A method, system and device for implementing security control are provided. The method for implementing security control includes: receiving, by the Policy and Charging Enforcement Function (PCEF) entity, security control policy information from the Policy Control and Charging Rules Function (PCRF) entity; and executing, by the PCEF entity, user security control according to the security control policy information. The provided method, system, and device may provide security control for the user session in the Policy Charging Control (PCC) architecture. | 2009-12-10 |
20090307747 | System To Establish Trust Between Policy Systems And Users - A system and method are provided to establish trust between a user and a policy system that generates recommended actions in accordance with specified policies. Trust is introduced into the policy-based system by assigning a value to each execution of each policy with respect to the policy-based system, called the instantaneous trust index. The instantaneous trust indices for each one of the policies, for the each execution of a given policy or for both are combined into the overall trust index for a given policy or for a given policy-based system. The recommended actions are processed in accordance with the level or trust associated with a given policy as expressed by the trust indices. Manual user input is provided to monitor or change the recommended actions. In addition, reinforcement learning algorithms are used to further enhance the level of trust between the user and the policy-based system. | 2009-12-10 |
20090307748 | METHOD AND ARRANGEMENT FOR USER FRIENDLY DEVICE AUTHENTICATION - The present invention relates to fraud prevention and authentication of a device to a user. The method of authenticating a personal device according to the invention comprises a set up sequence, wherein at least a first preferred output format is selected by the user, and a device configuration verification sequence. In the device configuration verification sequence a checksum is calculated and converted to a user friendly output format based on the user selected preferred output format. In addition the checksum may be calculated based on variable, and user selectable, keying material. The personal device, after being authenticated according to the above, may be used to authenticate a second device. | 2009-12-10 |
20090307749 | APPARATUS AND METHOD FOR INTELLECTUAL PROPERTY MANAGEMENT AND PROTECTION - Provided is an apparatus and method for intellectual property management and protection (IPMP). The present research provides an interface for confirming IPMP tools and exchanging information and an interface for managing a domain. The IPMP apparatus using a tool for managing and protecting intellectual property of contents and the other tool interacting with the first tool, includes: a tool information extraction unit for detecting information of the second tool based on a request of the first tool; and a tool reference unit for detecting a location of’ the second tool based on a request of the first tool and the extracted information of the second tool. The present research is applied to an IPMP apparatus. | 2009-12-10 |
20090307750 | Internet-based access controlled consumption of content and services using client-side credentials - System and methods for controlling access to internet content, comprising: a web-server; a client computer comprising a web-browser, communicating with the web-server over the internet; means for adding at least one characteristic of the client computer user to a web-page request sent from the client computer to the web-server; means for identifying the at least one characteristic of the client computer user; and means for selectively responding to the web page request, based on said at least one characteristic. | 2009-12-10 |
20090307751 | PRESERVING SECURITY ASSOCATION IN MACSEC PROTECTED NETWORK THROUGH VLAN MAPPING - According to one general aspect, a method of using a network device may include receiving, via an ingress port, a data packet that includes a payload portion, a source network address and a destination network address. In various embodiments, the method may also include determining if the data packet includes a security tag that includes a role based authentication tag. In some embodiments, the method may include, if the data packet includes a security tag that includes a role based authentication tag, transmitting, via an egress port, at least the payload portion and the role based authentication tag towards, in a topological sense, the destination network address. | 2009-12-10 |
20090307752 | NETWORK DEVICE MANAGEMENT APPARATUS AND CONTROL METHOD THEREOF - A network device management apparatus includes a search unit configured to search for a network device supporting a first communication protocol, an authentication information input unit configured to input authentication information used in communication with the network device using the first communication protocol, an authentication executing unit configured to execute authentication of the network device by using the authentication information, a first checking unit configured to, when the authentication by the authentication executing unit is successful, check whether a second communication protocol different from the first communication protocol is enabled in the network device, and a setting changing unit configured to change a setting of the second communication protocol depending on a result of the checking performed by the first checking unit. | 2009-12-10 |
20090307753 | NETWORK ACCESS CONTROL SYSTEM AND METHOD FOR DEVICES CONNECTING TO NETWORK USING REMOTE ACCESS CONTROL METHODS - A system and method for network access control (NAC) of remotely connected devices is disclosed. In embodiments, agents support role mapping and policy-based scanning. Embodiments automatically perform authentication, assessment, authorization, provisioning, and remediation. Capabilities include user authentication, role-based authorization, endpoint compliance, alarms and alerts, audit logs, location-based rules, and policy enforcement. Processes collect information about the user as well as the host being used from sources including, but not limited to, LDAP, the remote access device, and the agent. Once this data has been obtained, embodiments construct a comprehensive model of the host. This model is subsequently used to govern the actual host's network access when it connects to the network. Passive monitoring includes vulnerability scanning to control access rights throughout the duration of the connection. | 2009-12-10 |
20090307754 | METHODS, SYSTEMS, AND STORAGE MEDIUMS FOR IMPLEMENTING ISSUE NOTIFICATION AND RESOLUTION ACTIVITIES - Exemplary embodiments include methods, systems, and storage mediums for implementing issue notification and resolution activities. A method includes receiving a request for access to a network service from an end user client system associated with an account. Upon determining an issue is associated with the account, the method includes flagging a user profile for the account to reflect the issue. Flagging accounts includes assigning a unique flag for each type of issue for determining a location for routing the request associated with flagged user profiles. The method also includes redirecting the request for access to a web server of the service provider network. Upon successful resolution of the issue, the method includes providing access to the network service for the end user client system. | 2009-12-10 |
20090307755 | SYSTEM AND METHOD FOR FACILITATING CROSS ENTERPRISES DATA SHARING IN A HEALTHCARE SETTING - A method of sharing patient information including creating a release authorization containing sufficient information to identify a patient and information authorized for transmission, which is a subset of information stored by an electronic health record (EHR) entity for that patient; the release authorization associated with a patient or a person acting as a proxy for the patient; receiving a request from a recipient entity for information; identifying the subset of information associated with the release authorization to be transmitted from the EHR entity to the recipient entity; and transmitting the subset of information from the EHR entity to the recipient entity. | 2009-12-10 |
20090307756 | System of Electronic Document Repository which Guarantees Authenticity of the Electronic Document and Issues Certificates and Method of Registering, Reading, Issuing, Transferring, A Certificate Issuing Performed in the System - Provided are an electronic document repository system which guarantees authenticity of electronic document and issues certificates and methods of registering, reading, issuing, and transferring electronic documents in the system, and a method of issuing certificates in the system. The electronic document repository system includes an authentication module, a registration module, a reading module, an issuing module, and a certification module. | 2009-12-10 |
20090307757 | Method and System for Centralized Access Authorization To Online Streaming Content - The invention discloses a system to protect online streaming content by a content provider, by means of access authorization in the network operator's platform. The invention provides a solution to the problem of access authorization for streaming content, that is not exactly known with regards to description and/or location at the moment the access authorization is performed. | 2009-12-10 |
20090307758 | Method and apparatus to facilitate using a multicast stream to provide on-demand streaming content - A streaming content-on-demand service provider ( | 2009-12-10 |
20090307759 | Temporary Domain Membership for Content Sharing - In accordance with one or more aspects, a first device receives a digital certificate of a second device. The first device generates a digitally signed temporary domain join request and sends the request to a domain controller. The domain controller generates, for the first device, a temporary domain certificate allowing the first device to temporarily consume content bound to the domain. The temporary domain certificate is sent to the first device, allowing the first device to temporarily consume content bound to the domain. | 2009-12-10 |
20090307760 | ELECTRONIC MAIL TRANSMISSION AND RECEPTION SYSTEM - An electronic mail transmission/reception system is provided, capable of maintaining the confidentiality of restricted attachments desired to be limited in destination, thereby ensuring the security of the restricted attachments. A system management server | 2009-12-10 |
20090307761 | ACCESS AUTHORITY SETTING METHOD AND APPARATUS - An access authority setting method includes: detecting an action including activation of a virtual machine, stop of the virtual machine or a movement of the virtual machine between physical servers; and setting access authority required for a state after the action to a related apparatus among a connection apparatus and a disk apparatus in a system. By dynamically setting the access authority to the connection apparatus or disk apparatus according to an operation state of the virtual machine, the unauthorized access is prevented and the improvement of the security is realized. | 2009-12-10 |
20090307762 | SYSTEM AND METHOD TO CREATE, SAVE, AND DISPLAY WEB ANNOTATIONS THAT ARE SELECTIVELY SHARED WITHIN SPECIFIED ONLINE COMMUNITIES - A system and method for the creation and display of web annotations that are selectively shared within specified online communities is disclosed. An embodiment of the system and method include the use of a web browser plug-in that enables a computer user to create content and have that content associated with an Internet address in the form of a web note that is displayed to the user in a presentation layer over the Internet website. That web note is transmitted to a web server that stores the content and attributes of the web note in a database. When that user or another other user of the browser plug-in subsequently navigates to the aforementioned Internet address, that web note is retrieved from the database and displayed through the browser to the user in a presentation layer over the Internet website, independent of that Internet website based on user determined content sharing filters. | 2009-12-10 |
20090307763 | Automated Test Management System and Method - A test management application on a test management server includes a user interface on a Web-based portal by which a user can define one or more tests, selecting any desired configuration of operating system, connection type, and/or application, which are then saved in a test management database in the central server. Multiple tests involving the same configuration can be defined and saved for later selection, either individually or as a group of tests. A client agent engine on a test device can query the test management server for tests that can be conducted using the device's current configuration. If no such tests are found, the device can then query the test management server for the next available test. Upon allocation of the next available test to the device, the necessary system configuration for that test can be automatically retrieved, installed, and verified by the device. The device under test is automatically rebuilt to have the proper configuration for the test to be run. | 2009-12-10 |
20090307764 | Biometric Authenticaton System and Method with Vulnerability Verification - A biometric authentication device has a threat of an attack of pretending to be someone else by such as forgery. The present invention supports a service provider to appropriately decide the level of such threat. | 2009-12-10 |
20090307765 | AUTHENTICATING USERS AND ON-LINE SITES - A method and system enables a user and/or an on-line site to be authenticated by comparing a received password with an expected password, transmitting a new password if the received and expected passwords match, and authenticating a communication if the new password matches what is expected by the on-line site. The initially received password may be distorted, such as with CAPTCHA. | 2009-12-10 |
20090307766 | METHOD AND APPARATUS FOR VERIFYING DATA PACKET INTEGRITY IN A STREAMING DATA CHANNEL - Disclosed is a method for verifying data packet integrity in a streaming-data channel. In the method, data packets are received from the streaming-data channel. Each data packet includes a data payload and a corresponding message integrity code. The received data packets are processed in a first processing mode, wherein the received data packets are forwarded to an application module before checking the integrity of the data packets using the respective message integrity codes. An integrity-check-failure measurement is generated for monitoring an integrity-check-failure rate in the first processing mode. If the integrity-check-failure measurement exceeds an integrity-check threshold, then the method transitions to a second processing mode. A received data packet is forwarded to the application module in the second processing mode only after passing the integrity check. | 2009-12-10 |
20090307767 | Authentication system and method - An authentication system includes a user terminal to perform authentication based on a password corresponding to a seed number generated in accordance with a predefined rule. The system further includes a password issuance apparatus to issue the password in response to reception of a request message including the seed number. | 2009-12-10 |
20090307768 | PASSWORD INPUT SYSTEM AND METHOD - A password input system includes a touch screen, a storing module, and an authentication module. The touch screen is capable of displaying a number of symbols, and is used for inputting a password by drawing a line group between the symbols on the touch screen, the line group includes one or more lines. The storing module stores a password consisting of characteristics of a preset line group. The authentication module is capable of comparing the characteristics of the line group drawn on the touch screen with the characteristics of the preset line group stored in the storing module, and allowing or denying a user's access to a main system by judging whether the characteristics of the line group drawn on the touch screen is matched with the characteristics of the preset line group stored in the storing module. | 2009-12-10 |
20090307769 | METHOD AND APPARATUS FOR PROVIDING NETWORK SECURITY - The invention relates to the provision of virus scanning capabilities in a network environment. Optimum use is made of a plurality of virus scanners by inspecting content passed over the network to identify which of the scanners is most suitable for that content. The content is then passed to the appropriate scanners in dependence on the results of the inspection. | 2009-12-10 |
20090307770 | APPARATUS AND METHOD FOR PERFORMING INTEGRITY CHECKS ON SOFWARE - An apparatus and method are provided for performing integrity checking of software code executing on a processing unit of the apparatus. The apparatus further includes debug logic used when debugging program code executed by the processing unit, and trusted logic for performing trusted integrity checking operations on less-trusted program code executed by the processing unit. The debug logic has an interface via which the trusted logic can program one or more control registers, that interface not being accessible by the less-trusted program code. The trusted logic programs the control registers so as to cause the debug logic to be re-used to detect one or more activities of the processing logic during execution of the less-trusted program code, and the trusted integrity checking operations performed by the trusted logic are influenced by the activities detected by the debug logic. Such an approach has been found to provide an efficient and secure technique for performing run-time integrity checking of program code. | 2009-12-10 |
20090307771 | DETECTING SPAM EMAIL USING MULTIPLE SPAM CLASSIFIERS - A method for detecting undesirable emails combines input from two or more spam classifiers to provide improved classification effectiveness and robustness. The method includes obtaining a score from each of a plurality of constituent spam classifiers by applying them to a given input email. The method further includes obtaining a combined spam score from a combined spam classifier that takes as input the plurality of constituent spam classifier scores, the combined spam classifier being computed automatically in accordance with a specified false-positive vs. false-negative tradeoff. The method further includes identifying the given input email as an undesirable email if the combined spam score indicates that the input e-mail is undesirable. | 2009-12-10 |
20090307772 | FRAMEWORK FOR SCALABLE STATE ESTIMATION USING MULTI NETWORK OBSERVATIONS - A framework for state estimation using multi-network observation. Highly scalable qualitative probabilistic algorithms may be used to combine noisy, uncertain outputs having multi-modal event data from numerous networks into a relatively accurate and coherent estimate of the system state. Models of disparate networks may be pulled together to result in unified multi-modal event data. Information from multiple networks may be graphed and analyzed. | 2009-12-10 |
20090307773 | SYSTEM AND METHOD FOR ARP ANTI-SPOOFING SECURITY - A system and method that provides for copying ARP replies, and generating data packets which include the ARP reply, and other information such as an identification of the port on the ARP reply was received. These data packets are then transmitted to an ARP collector which stores the ARP reply and port information. The ARP collector then uses this stored information, and analyzes future data packets relative to the stored information to detect occurrences of ARP spoofing. The ARP collector further provides for generating alerts and taking security actions when ARP reply spoofing is detected. | 2009-12-10 |
20090307774 | COMPUTER PERIPHERAL APPARATUS AND METHOD OF CONTROLLING THE SAME - A computer peripheral apparatus of this invention has a check step of checking whether received data is infected with a computer virus. If the received data satisfies a predetermined condition, the apparatus executes the check step before predetermined data processing. If the received data does not satisfy the predetermined condition, the apparatus executes the check step before the predetermined data processing. | 2009-12-10 |
20090307775 | IDENTIFYING FRAUDULENT ACTIVITIES AND THE PERPETRATORS THEREOF - A system for identifying perpetrators of fraudulent activity includes location logic for locating, extracting, or capturing identifying information from a client communication received from a client device. For example, the location logic may locate, or extract, a variety of message headers from an HTTP client request. The system may also include analyzer logic to analyze the identifying information, for example, by comparing the identifying information with previously captured identifying information from a previously received client communication. Finally, the system may include account identifier logic to identify user accounts associated with the previous client communication in which the same identifying information was extracted. | 2009-12-10 |
20090307776 | METHOD AND APPARATUS FOR PROVIDING NETWORK SECURITY BY SCANNING FOR VIRUSES - The invention relates to the provision of virus scanning capabilities in a network environment. A plurality of preliminary content processing functions are carried out on content passed over the network before the content is passed to one or more virus scanners. The virus scanners then scan the content for viruses using one or more results of the content processing functions. | 2009-12-10 |
20090307777 | METHOD AND DEVICE FOR PREDICTING NETWORK ATTACK ACTION - A method for predicting a network attack action, including: monitoring a network status parameter and obtaining information of an attack action according to a change of the network status parameter; selecting a subsequent attack action which has a most possibility to happen from a plurality of subsequent attack actions of the attack action according to a correspondence between the attack action and the plurality of subsequent attack actions, the subsequent attack action which has the most possibility to happen being a subsequent attack action with a largest occurrence number among the subsequent attack actions corresponding to the attack action; and outputting the subsequent attack action which has the most possibility to happen as a predicted network attack action. A device for predicting a network attack action including an attack action management unit is also provided. The present invention describes the attack action procedure and the relation among attack actions during the attack action procedure and provides a network pre-warning method for determining which action is to be taken. | 2009-12-10 |
20090307778 | Mobile User Identify And Risk/Fraud Model Service - Transactions using, for example, Near Field Communication (NFC), Bluetooth, online, or other applications, may pose a risk of fraud or identity theft. According to an embodiment, a method of evaluating transaction information in view of potential fraud and/or risk includes receiving transaction information at a remote location. The method also includes correlating the received transaction information with user data maintained at the remote location. The method further includes generating a score and/or risk or fraud data based on the correlating. Such transactions may be facilitated by a payment service provider. Related methods, devices, and systems are also disclosed. | 2009-12-10 |
20090307779 | Selective Security Masking within Recorded Speech - A marker is derived from an interaction between a person and an agent of a business and the agent's user interface. A part of a speech signal that corresponds to a portion of the person's special information is located with the marker. The speech signal results from the interaction between the person and the agent. The part of the speech signal that corresponds to the portion of the person's special information is rendered unintelligible. | 2009-12-10 |
20090307780 | USING TRUSTED THIRD PARTIES TO PERFORM DRM OPERATIONS - Various embodiments utilize a third party, such as a trusted third-party, to perform DRM operations such as “move” operations. In at least some embodiments, the trusted third-party is utilized for both “move” operations as well as local content access such as playback and the like. In at least some embodiments, a third-party maintains a database that includes an association of clients, content, and move version numbers. A client—termed a “source client” maintains at least a move version number locally in a secure fashion. The version number is incremented each time the source client performs a move operation. Both the source client and the third-party increment the version number each time a piece of content is moved. When the client attempts to perform a move operation, it contacts the third-party to ascertain the third-party's move version number. If the move version numbers match and the source client owns the license/content, then, in at least some embodiments, a move operation is permitted. | 2009-12-10 |
20090307781 | PROGRAM EXECUTION CONTROL METHOD, ITS DEVICE, AND EXECUTION CONTROL PROGRAM FOR SAME - Provided are a program execution control method, its device, and an execution control program safely executing an application program containing an untrusted code while reducing overhead. Execution environment creating means ( | 2009-12-10 |
20090307782 | DOCUMENT MANAGEMENT SYSTEM, DOCUMENT MANAGEMENT METHOD AND COMPUTER PROGRAM - When a shortcut of a document is generated, a user is caused to set the number of times of access to the shortcut. A shortcut identifier for identifying the shortcut is generated. The shortcut identifier and the number of times of access are registered in a shortcut management table in association with each other. Thereafter, the generated shortcut identifier and a mail address as a destination of a mail are set in the shortcut. The mail attached with the shortcut is transmitted. When the mail address set in the shortcut attached to the received mail and a mail address of the user stored in a PC that receives the mail coincide with each other, access to the document linked to the shortcut is permitted. This enables to more appropriately adjust the access to the document than in the past without changing an access right of the document itself. | 2009-12-10 |
20090307783 | DATA PROCESSING DEVICE, METHOD, PROGRAM, INTEGRATED CIRCUIT, AND PROGRAM GENERATING DEVICE - A data processing apparatus controls execution of debugging of a program performed by a debugger. The program includes a verification value used for judgment on whether to permit the debugging, and an access control list that shows whether to permit an access to each of parts constituting the program. The data processing apparatus acquires a debugger ID of the debugger from the debugger, and the verification value and the access control list included in the program. The data processing apparatus judges whether to permit the debugging, according to the result of comparison between the debugger ID and the verification value. The data processing apparatus permits an access to a part of the program to be debugged when the access control list shows that the access is permitted. The data processing apparatus does not permit the access to the part when the access control list shows that the access is not permitted. | 2009-12-10 |
20090307784 | Methods of Analysing Cell Behaviour - The invention related to a method of imaging a clonal cell line comprising providing a test animal comprising a marker gene, inducing inheritable activation of said marker in at least one cell of said test animal, wherein inheritable activation is induced in fewer than 1 in 27 cells in the tissue of interest, incubating the test animal, and visualising those clonal cells which express the marker gene as a result of the inheritable activation. In particular the invention concerns-methods where the tissue is epidermis, and wherein the visualisation is by confocal microscopy such as wholemount confocal microscopy. The invention also relates to toxicity and carcinogenicity testing using such methods. | 2009-12-10 |
20090307785 | Transgenic animals for analyzing CYP3A4 cytochrome P450 gene regulation - The invention relates to the generation of non-human transgenic animals comprising a reporter construct for producing a detectable amount of a reporter molecule operably linked to a transcriptional regulatory nucleic acid molecule from the human CYP3A4 gene located between the initiation of transcription site of the gene and a position located 13,000 nucleotides upstream from the site. The invention also relates to the use of these animals for determining the effect of a compound, particularly, but not exclusively, a xenobiotic or steroid, on the regulation of expression of the CYP3A4 gene in a human. | 2009-12-10 |
20090307786 | Methods for producing a protein using an avian lysozyme promoter - The invention includes methods of producing proteins in transgenic avians containing nucleic acids in their genome which contain an exogenous lysozyme gene expression controlling nucleotide sequence which typically is linked to a polynucleotide encoding a heterologous polypeptide. | 2009-12-10 |
20090307787 | GENERATION OF HEAVY-CHAIN ONLY ANTIBODIES IN TRANSGENIC ANIMALS - The present invention relates to a method for the generation of V | 2009-12-10 |
20090307788 | RIBOZYME MEDIATED STABILIZATION OF POLYNUCLEOTIDES - The present invention relates to the production of novel, recombinant polynucleotides comprising the GIR1 ribozyme, or a variant thereof, vectors comprising such polynucleotides and recombinant host cells comprising such polynucleotides and/or such vectors. The invention furthermore relates to the use of said polynucleotides in the treatment of an individual suffering from a disease associated with or caused by instability of a transcript of said second subsequence such as cancer, cachexia, α-Thallasemia or leukaemia. | 2009-12-10 |
20090307789 | TRANSGENIC MOLLUSK AND METHOD FOR PRODUCING THE SAME - A transgenic mollusk which can express a desired foreign gene, and a method for producing the same are disclosed. The mollusk is a transgenic mollusk into which a desired foreign gene (excluding a gene giving resistance to a virus) is introduced, which expresses the foreign gene. This transgenic mollusk can be produced by microinjecting into gonad of male and/or female of mollusk a recombinant vector into which a desired foreign gene to be introduced or a nucleic acid containing the foreign gene is inserted; crossing the male and female to produce individuals of first generation; and selecting therefrom (an) individual(s) which express(es) the desired gene. | 2009-12-10 |
20090307790 | ISOLATION OF THE T-COMPLEX DISTORTERS AND APPLICATIONS THEREOF - The present invention relates to a method for producing a transgenic non human male animal, preferably a mammal, fish, bird or insect, wherein the transgene(s) confer(s) a change in the transmission ratio of (a) genetic trait(s) to the offspring of said non human male animal, preferably mammal, fish, bird or insect to a non-Mendelian ratio, said method comprising introducing (a) a first nucleic acid molecule encoding an expression product with a Responder function into a chromosome of a non-human germ cell, (fertilized) egg cell, embryonic cell or a cell derived therefrom, of the same species as the transgenic male to be prepared, said chromosome containing or conferring said genetic trait(s), thereby linking on said chromosome said Responder function to the genetic trait(s); and (b) at least one second nucleic acid molecule encoding an expression product with a Distorter function into (a) chromosome(s) of a non-human germ cell, (fertilized) egg cell, embryonic cell or a cell derived therefrom, of the same species as the transgenic male to be prepared, wherein said expression product with a Distorter function is a factor involved in G protein signaling, wherein said first nucleic acid molecule encoding an expression product with Responder function and said at least one second nucleic acid molecule encoding an expression product with a Distorter function are introduced into the same or different chromosomes. | 2009-12-10 |
20090307791 | CALCIUM-ACTIVATED CHLORIDE CHANNEL AND METHODS OF USE THEREOF - The present invention provides a cloned, isolated calcium-activated chloride channel, and a polynucleotide comprising a nucleotide sequence encoding the channel. The present invention further provides a genetically modified cell comprising a subject polynucleotide, and use of the cells to identify agents that modulate calcium-activated chloride channel activity. The present invention further provides genetically modified cells and non-human animals that do not express a subject calcium-activated chloride channel. | 2009-12-10 |
20090307792 | INBRED RADISH LINE NIZ-AC2 - An inbred radish line having resistance to white rust ( | 2009-12-10 |
20090307793 | PLANTS EXPRESSING ENVIRONMENTAL STRESS TOLERANCES HAVING PETUNIA CBF GENES THEREIN - The present invention provides a method of controlling a plant's tolerance to environmental stress and to a transgenic plant having the desired characteristics. | 2009-12-10 |
20090307794 | Stress-Induced Transcription Factor Derived from Maize - This invention relates to a stress-inducible transcription factor derived from maize, a gene encoding the same, and a method for using the same. Specifically, this invention provides a gene comprising the following DNA (a) or (b): (a) DNA consisting of the nucleotide sequence as shown in SEQ ID NO: 1; or (b) maize-derived DNA hybridizing under stringent conditions with DNA consisting of a nucleotide sequence that is complementary to the DNA consisting of the nucleotide sequence as shown in SEQ ID NO: 1 and encoding a protein that regulates the transcription of a gene located downstream of a stress responsive element. Further, this invention relates to a transgenic plant having improved tolerance to environmental stress, such as high-temperature or dehydration stress, into which such gene has been introduced. | 2009-12-10 |
20090307795 | ZMTCRR-1 PLANT SIGNAL TRANSDUCTION GENE AND PROMOTER - The present invention relates to the improvement of agronomic qualities of plants. It concerns in particular a nucleic acid molecule encoding a plant signal transduction protein that modulates agronomic qualities of plants. | 2009-12-10 |
20090307796 | PLANTS WITH INCREASED TOLERANCE TO WATER DEFICIT - The invention relates to a method for increasing the tolerance of a plant to water deficit, by overexpression in the plant of a protein, designated ABA4, which is involved in the conversion of violaxanthin to neoxanthin in the biosynthesis of abscisic acid. | 2009-12-10 |
20090307797 | Seed-Preferred Regulatory Elements - The present invention provides compositions and methods for regulating expression of nucleotide sequences in a plant. Compositions are novel nucleotide sequences for a tissue preferred promoter isolated from the sorghum 16 kDa oleosin coding region. The sequences drive expression preferentially to seed tissue, and most preferably to embryo and/or aleurone tissue of a plant. Functional fragments of same are also provided. A method for expressing a nucleotide sequence in a plant using the regulatory sequences disclosed herein is provided. The method comprises transforming a plant cell to comprise a nucleotide sequence operably linked to one or more of the regulatory sequences of the present invention and regenerating a stably transformed plant from the transformed plant cell. | 2009-12-10 |
20090307798 | Polynucleotides and Methods for Making Plants Resistant to Fungal Pathogens - This invention relates to polynucleotide sequences encoding genes that can confer resistance to the plant pathogen | 2009-12-10 |
20090307799 | METHOD TO IDENTIFY DISEASE RESISTANT QUANTITATIVE TRAIT LOCI IN SOYBEAN AND COMPOSITIONS THEREOF - The present invention is in the field of plant breeding and genetics, particularly as it pertains to the genus, Glycine. More specifically, the invention relates to a method for screening soybean plants containing one or more quantitative trait loci for disease resistance, species of Glycine having such loci and methods for breeding for and screening of Glycine with such loci. The invention further relates to the use of exotic germplasm in a breeding program. | 2009-12-10 |
20090307800 | Compositions and Methods of Use of Mitogen-Activated Protein Kinase Kinase Kinase - Methods and compositions for modulating plant response, development and yield under varying environmental conditions are provided. Methods employing MAPKKK are provided. The MAPKKK sequences are used in a variety of methods including modulating root development, modulating leaf and/or shoot development, modulating tolerance under abiotic stress and modulating yield. Transformed plants, plant cell, tissues, seed and expression vectors are also provided. | 2009-12-10 |
20090307801 | NOVEL PLANTS - Disclosed are novel genetically modified plant cells wherein a SHI (short internodes) family gene is integrated into the nuclear genome. Also disclosed are plant cells where a SHI antisense gene is integrated or plants including heterologous expression control of autologous SHI genes. The plant cells confer novel phenotypes upon plants incorporating the SHI family gene. The invention also discloses transgenic plants and methods for plant production, where the plants are dwarfed, but exhibit normal or increased flower set after induction of flowering with GA. The plants of the invention are obtained without use of any growth retardants. | 2009-12-10 |
20090307802 | EPSPS Mutants - The present invention relates to the production of a non-transgenic plant resistant or tolerant to a herbicide of the phosphonomethylglycine family, e.g., glyphosate. The present invention also relates to the use of a recombinagenic oligonucleobase to make a desired mutation in the chromosomal or episomal sequences of a plant in the gene encoding for 5-enol pyruvylshikimate-3-phosphate synthase (EPSPS). The mutated protein, which substantially maintains the catalytic activity of the wild-type protein, allows for increased resistance or tolerance of the plant to a herbicide of the phosphonomethylglycine family, and allows for the substantially normal growth or development of the plant, its organs, tissues or cells as compared to the wild-type plant irrespective of the presence or absence of the herbicide. Additionally the present invention relates to mutant | 2009-12-10 |
20090307803 | Compositions and methods for control of insect infestations in plants - The present invention is directed to controlling pest infestation by inhibiting one or more biological functions in an invertebrate pest. The invention discloses methods and compositions for use in controlling pest infestation by feeding one or more different recombinant double stranded RNA molecules to the pest in order to achieve a reduction in pest infestation through suppression of gene expression. The invention is also directed to methods for making transgenic plants that express the double stranded RNA molecules, and to particular combinations of transgenic pesticidal agents for use in protecting plants from pest infestation. | 2009-12-10 |
20090307804 | Transcription Regulating Nucleotide Sequence from Solanaceae Triose-Phosphate Translocator Genes and Their Use in Plant Expression Cassettes - The present invention relates to transcription regulating sequences from Solanaceae triose-phosphate translocator (TPT) genes and their use in plant expression cassettes. Preferably, the transcription regulating sequence is from the | 2009-12-10 |
20090307805 | ALTERNATIVE NUCLEOTIDES FOR IMPROVED TARGETED NUCLEOTIDE EXCHANGE - A method and oligonucleotides for targeted nucleotide exchange of a duplex DNA sequence, wherein the donor oligonucleotide contains at least one modified nucleotide having a higher binding affinity compared to naturally occurring A, C, T or G and/or binds stronger to a nucleotide in an opposite position in the first DNA sequence as compared to a naturally occurring nucleotide complementary to the nucleotide in the opposite position in the first DNA sequence. | 2009-12-10 |
20090307806 | GENETIC MARKERS FOR HIGH OLEIC ACID CONTENT IN PLANTS - The present invention relates to a mutated nucleic acid sequence of a delta-12 oleate desaturase enzyme (FAD2)—encoding nucleic acid from a Cruciferae plant, wherein said mutated nucleic acid sequence comprises the non-conservative mutation of at least one nucleotide of at least one codon representing an amino acid selected from the group consisting of: —the amino acid at position 259 of the amino acid sequence of said FAD2, —the amino acid at position 216 of the amino acid sequence of said FAD2, —the amino acid at position 90 of the amino acid sequence of said FAD2, —the amino acid at position 116 of the amino acid sequence of said FAD2, —the amino acid at position 276 of the amino acid sequence of said FAD2. | 2009-12-10 |
20090307807 | Nucleic acid molecules and other molecules associated with plants - The present invention is in the field of plant genetics. More specifically the invention relates to nucleic acid molecules and nucleic acid molecules that contain markers, in particular, single nucleotide polymorphism (SNP) and repetitive element markers. In addition, the present invention provides nucleic acid molecules having regulatory elements or encoding proteins or fragments thereof. The invention also relates to proteins and fragments of proteins so encoded and antibodies capable of binding the proteins. The invention also relates to methods of using the nucleic acid molecules, markers, repetitive elements and fragments of repetitive elements, regulatory elements, proteins and fragments of proteins. | 2009-12-10 |
20090307808 | MEASURING SCANNING PROBE FOR SCANNING A SURFACE TO BE MEASURED - A measuring scanning probe for scanning a surface to be measured, including a stylus so as to provide a measuring point at a first end of the stylus for scanning the surface to be measured and a base part that is to be fixedly connected to a scanning device. The stylus is movably suspended from the base part by one or more bending elements. The measuring scanning probe is substantially planar in shape. The stylus, the one or more bending elements, and the base part are located in a single main plane of the planar measuring scanning probe. | 2009-12-10 |
20090307809 | SCANNING PROBE MICROSCOPE AND METHOD FOR OPERATING THE SAME - The scanning probe microscope has a primary control loop ( | 2009-12-10 |
20090307810 | Grape Plant Named 'A-2640' - A grape cultivar particularly distinguished by large, seedless, black-skinned berries, large clusters, with a mid to late season of ripening, high productivity and good vine health, is disclosed. | 2009-12-10 |
20090307811 | CALATHEA PLANT NAMED 'PP0005' - A new and distinct | 2009-12-10 |
20090307812 | EUPHORBIA PLANT NAMED 'PP0006' - A new and distinct | 2009-12-10 |
20090307813 | EUPHORBIA PLANT NAMED 'AUTUMN SUNSET' - A new and distinct | 2009-12-10 |
20090307814 | GUZMANIA PLANT NAMED 'SKOHICLI' - A new and distinct | 2009-12-10 |
20090307815 | Dianella prunina plant named 'DPV308" - ‘DPV308’ is a distinctive variety of | 2009-12-10 |