Patents Issued in December 20, 2001
-
Publication number: 20010054141Abstract: A pattern generator includes an address generator, an address topology generator, and a data topology generator. The address generator is adapted to provide a first address having a plurality of address bits. The address topology generator includes a first plurality of programmable logic gates. Each programmable logic gate of the first plurality is coupled to receive at least a subset of the plurality of address bits. The first plurality of programmable logic gates generate a second address having a plurality of modified address bits. The data topology generator is adapted to receive at least a subset of the plurality of modified address bits and generate write data based on the subset of modified address bits. A method for generating a pattern includes generating a first address having a plurality of address bits. A second address having a plurality of modified address bits is generated. The second address is a programmable combination of subsets of the address bits.Type: ApplicationFiled: July 24, 2001Publication date: December 20, 2001Applicant: Micron Technology, Inc.Inventors: Charles K. Snodgrass, Bruce A. Dickey
-
Publication number: 20010054142Abstract: A secure database system comprises a server having a database including at least one personal information table and at least one further table containing information relating to the persons whose details are stored in the personal information table. The keys of the tables in the database are unrelated, so that it is impossible to determine solely from information in the server which record in the further table corresponds to which record in the personal information table. Thus, even if a hacker obtains access to the database, the hacker will not be able to relate information in the different tables. Each legitimate client uses an encryption process to convert a personal identifier value, which identifies the record relating to a particular person in the personal information table, into a pseudo-identifier value, which identifies a record relating to the same person in the further table.Type: ApplicationFiled: May 14, 1998Publication date: December 20, 2001Inventor: GILLES WILLEM VAN BLARKOM
-
Publication number: 20010054143Abstract: The present invention allows assuring security of processing by the application itself without depending on the operating system. When a plurality of clients perform joint operation via a common server, the processing permitted for each server to perform to the server is predetermined, and when a user requests a processing which is not permitted, the client rejects this request. By this, the security among a plurality of clients can be assured without depending on the server.Type: ApplicationFiled: December 5, 2000Publication date: December 20, 2001Applicant: KIZNA.COM, INC.Inventors: Takeo Miyazawa, Tetsuya Okada
-
Publication number: 20010054144Abstract: A verification system is configured to verify the presence of an entire data set before individual data items within the set can be accessed for playback or other processing. Each data item in the data set comprises one or more sections, and the totality of sections constitute the complete data set. Each section of the data set contains a watermark that includes an identifier that confirms the presence of the section as originally recorded. The presence of the data set is confirmed by checking the watermarks of randomly selected sections to verify that the original sections that formed the data set are present, or, by maintaining a record of accessed sections to verify that a substantial portion of the data set is present. To allow for the possible noise-corruption of one or more watermarks, the verification system is configured to allow for a less-than-absolute verification.Type: ApplicationFiled: May 4, 2001Publication date: December 20, 2001Inventors: Michael Epstein, Martin Rosner
-
Publication number: 20010054145Abstract: To dynamically embed information with a digital content taken into account a digital information embedding device includes an input block receiving an image, a feature value parsing block detecting a feature value of at least a partial area of the input image, and an information embedding block modifying the area, based on the detected feature value. A feature value detected can be referred to to modify an area. This allows a content of an image to be considered in embedding digital information.Type: ApplicationFiled: June 7, 2001Publication date: December 20, 2001Inventor: Mitsunobu Shimada
-
Publication number: 20010054146Abstract: A method of marking an original text document in which existing inter-word blank characters are altered is disclosed. A reversible transform is first applied so that inter-word intervals become exclusively comprised of odd numbers of blank characters. Transformed original text is then split in two subsets and an authentication pattern is merged into first subset by adding inter-word blank characters. A blurring pattern is computed which further modify the number of blank characters so as to hide the authentication pattern. Second subset is blurred too before subsets are recombined to obtain a marked text susceptible of authentication.Type: ApplicationFiled: March 13, 2001Publication date: December 20, 2001Inventors: Fernando Incertis Carro, Stephen M. Matyas
-
Publication number: 20010054147Abstract: A method, apparatus and system for electronically verifying that a person using an electronic apparatus is who the person claims to be. It may be used for computers, e-commerce, financial transaction cards, automotive access and ignition, security badges, building access, cell phones and any other application in which electronic identification of a person is required. The security device in initiating a contact or in response to an inquiry as to identification transmits its public key identification number. The host encrypts a random message utilizing the user's public key identification number. Assuming the user is who the user claims to be, the user is able to decrypt the random message utilizing the user's corresponding private key. The private key never needs to be disclosed to anyone. The random message is changed with each use.Type: ApplicationFiled: January 16, 2001Publication date: December 20, 2001Inventor: Ernest S. Richards
-
Publication number: 20010054148Abstract: The invention defines a digital programmable smart card terminal device and token collectively known as the token device. The token device comprises a field programmable token device which accepts a users smart card. The combination of token device and smart card may then be used for a variety of applications that include user authentication, secure access, encryption. One specific application is that of an electronic wallet. The token device can be used both in connected and unconnected modes.Type: ApplicationFiled: February 20, 2001Publication date: December 20, 2001Inventors: Frank Hoornaert, Mario Houthooft
-
Publication number: 20010054149Abstract: A justification/authentication personal certificate system stores in a remote database a counterpart of an identifier and a digital watermark contained in the personal certificate. The personal certificate includes the digital watermark embedded in an authentic image such as a facial photograph, a retinal scan, or a fingerprint. When the personal certificate is used, the authentic image is read from the personal certificate, and the digital watermark information is extracted. The digital watermark information and the identifier are compared with the counterparts stored in the database. If the extracted digital watermark information is identical to the information in the database, then the personal certificate is judged to be unjustifiable. In one embodiment, at least one of the identifier and digital watermark are changed each time the system justifies the personal certificate.Type: ApplicationFiled: June 20, 2001Publication date: December 20, 2001Inventors: Yuichi Kawaguchi, Yuji Shimizu, Shinichi Tsumori, Takashi Katsura, Hisashi Inoue
-
Publication number: 20010054150Abstract: A method for controlling watermark embedding in a media object through the use of a watermark embedding command. In the process of creating the media object, the method includes a watermark embedding command among a set of one or more rendering commands that specify how the media object is to be rendered. For example, certain media signal formats like PCL, PDF, or postscript for images, MIDI and structured audio for audio signals, and MPEG-4 and MPEG-7 for audio and video signals, include descriptors that control how a particular media signal is to be rendered. The watermark embedding command includes a combination of the following items: an identifier used to link to customer or related content information, the customer's web site, the intensity at which to embed the watermark, areas not to embed, batch processing options, printing preferences for images, watermarking embedding methods to use on different media types, formats, or different parts of the media object, and desired rendering quality.Type: ApplicationFiled: March 16, 2001Publication date: December 20, 2001Inventor: Kenneth L. Levy
-
Publication number: 20010054151Abstract: A method for verifying the identity of a new-user of a computer system, comprising the steps of receiving at least one identity attribute from the new-user; similarity searching the at least one new-user identity attribute against at least one database of denied-user identity attributes; receiving a similarity search result; determining a positive or negative match between the at least one new-user identity attribute and the denied-user identity attributes; allowing the new-user to access the computer system, where a negative match has been determined; and denying the new-user access to the computer system, where a positive match has been determined.Type: ApplicationFiled: April 24, 2001Publication date: December 20, 2001Inventors: David B. Wheeler, John R. Ripley, Paul Leury, Steven C. Wotring
-
Publication number: 20010054152Abstract: A process controlling unit included in a multifunction-device controller sends an acquired ID number and a request for identifying the user corresponding to the ID number, to a controller server. The controller server searches a user management file for user information corresponding to the ID number. The controller server sends, to the multifunction-device controller, information representing that user verification is successfully made when user information is acquired. Upon reception of such information, the process controlling unit permits the verified user to operate a copier making copies of documents. Upon completion of the copying operation, the process controlling unit acquires information representing the number of copies made by the user. Then, the process controlling unit creates usage information of the copier, and sends the created usage information to the controller server. The controller server stores the received usage information into a usage-information management file.Type: ApplicationFiled: February 8, 2001Publication date: December 20, 2001Applicant: Ricoh Company, Ltd.Inventors: Toshiyuki Nakao, Kazuhiro Hayama, Norihiko Matsuo
-
Publication number: 20010054153Abstract: A method for verifying the identities of new users of a computer system, using batch similarity searching. The method comprises receiving a plurality of records, each record containing profile data input by a new user; similarity searching the profile data of each record against suspended-users profile data; determining, for each record, whether a positive match or a negative match exists between the profile data of the record and the suspended-users profile data; allowing a new user to access the computer system, where a negative match is determined between the record of the new user and the suspended-users profile data; and forwarding the record of a new user to a review process, where a positive match is determined between the record of the new user and the suspended-users profile data.Type: ApplicationFiled: April 24, 2001Publication date: December 20, 2001Inventors: David B. Wheeler, John R. Ripley, Paul Leury
-
Publication number: 20010054154Abstract: A method for making a secured personal identity card and procedures for validation and obtaining secure personal information includes the steps of (a) collecting a set of personal information from a user into an identity file wherein the identity file includes at least one section; (b) receiving an inputting personal identification number (“PIN”); and (c) comparing the inputting PIN with a master PIN preset in the identity file. Therefore, the user selectively and securely releases only specific information based upon the inputting PIN as compared to the biographical information guarded by the master PIN.Type: ApplicationFiled: March 30, 2001Publication date: December 20, 2001Inventor: Joseph Wing On Tam
-
Publication number: 20010054155Abstract: Personal information of users is used to customize the browsing experiences of the users on a World-Wide-Web site. To ensure privacy of the users' personal information, each user is assigned a unique Universal Anonymous Identifier (UAI). The UAI is generated by a trusted third party and provided to the Web site operator. The Web site operator then indexes the users' personal information by UAI. Only the user has the ability to correlate his/her true identity with his/her personal information.Type: ApplicationFiled: December 21, 2000Publication date: December 20, 2001Inventors: Thomas Hagan, David Levy, Matthew Kamerman
-
Publication number: 20010054156Abstract: If a tracking pattern superimposed on print data is discriminated, a malicious user may tamper the pattern, resulting in a deterioration in the reliability of the tracking pattern itself. According to this invention, therefore, a tracking pattern generating unit generates a tracking pattern, and a data addition processing unit adds the tracking pattern to image data. An encryption processing unit encrypts the image data to which the tracking pattern is added to make it difficult to detect that the tracking pattern is added, and transmits the resultant data to a printing apparatus. This makes it difficult to discriminate the tracking pattern from the image data, thus providing the highly reliable tracking pattern.Type: ApplicationFiled: June 14, 2001Publication date: December 20, 2001Inventor: Minoru Teshigawara
-
Publication number: 20010054157Abstract: When a firewall receives, from a mobile terminal via the Internet, an access request which designates a URL including a http, a domain name containing a host name, a service name, a machine name, and a specific port number, the firewall outputs the request to a corresponding port of a relay server. The relay server sends an authentication page to the request source terminal to cause the user to input authentication data, and causes an authentication server to authenticate the request source user on the basis of the input authentication data. If authentication succeeds, the relay server checks whether the authenticated user can receive a service represented by the service name and machine name in the URL. If the user can receive the service, the relay server sets a session, and grants request/response communication between the mobile terminal of the request source and the request destination in the session.Type: ApplicationFiled: February 27, 2001Publication date: December 20, 2001Applicant: KABUSHIKI KAISHA TOSHIBAInventor: Yuji Fukumoto
-
Publication number: 20010054158Abstract: A first node (client) (1) is in communication with one of a plurality of second nodes (5, 6, 7) connected to a local area network (LAN) (4) via a virtual private network including a link (3), such as the Internet, and a selected one of a plurality of third nodes (gateway servers) (21, 22, 23). Communication between the first node (1) and the third nodes (21, 22, 23) is encrypted, whereas communication between the third nodes and the second nodes (5, 6, 7) is unencrypted. Communication from the first node (1) to one of the second nodes (5, 6, 7) is initially set up via a selected one of the third nodes after suitable authentication. If that third node should subsequently fail, an alternative third node can be used. To detect the failure of a third node, the first node (1) sends a “heartbeat” packet (failure detection signal) to it. An operational third node responds with an answer, indicating that all is well.Type: ApplicationFiled: May 22, 2001Publication date: December 20, 2001Inventor: Mark Joseph Stefan Jarosz
-
Publication number: 20010054159Abstract: The present invention enables the flexible cooperation of an internal network with an external network while preventing a direct intrusion to the internal network by physical means with respect to the access from the external network.Type: ApplicationFiled: June 18, 2001Publication date: December 20, 2001Applicant: IONOS CO., LTDInventor: Hirokazu Hoshino
-
Publication number: 20010054160Abstract: In a power on/off circuit apparatus, in the case where a microcomputer 4 runs away, an on/off operation of a power switch 3 is carried out, and thereby, the microcomputer 4 is reset. A non-volatile memory 14 stores an operating state of equipments just before the power switch 3 is operated. Therefore, when the microcomputer 4 makes a malfunction, without plugging an AC code out of a receptacle, it is possible to reset the microcomputer 4 by the power switch 3, and thus, to transfer the equipments from a state just before reset to the next operating state.Type: ApplicationFiled: April 20, 2001Publication date: December 20, 2001Inventor: Chiaki Hashimoto
-
Publication number: 20010054161Abstract: A method for managing a computer system includes initiating a reset of the computer system from a remote location. Diagnostic software on the computer system is downloaded from the remote location.Type: ApplicationFiled: July 15, 1998Publication date: December 20, 2001Inventor: ROBERT J WOODDRUFF
-
Publication number: 20010054162Abstract: A method for transmitting/receiving wireless data and an apparatus therefor according to the quality of an application service and features of a coder/decoder (CODEC) of an application layer are provided. The method for transmitting/receiving wireless data includes the steps of: establishing a catalog of information related to the application data service; adding header information of each layer by referring to the catalog established in the above step, and error detecting codes to the application data; deciphering a header if data errors are detected by the error detecting codes added to the data during the reception, and transmitting the data to the upper ranking layer according to the quality of service, if the deciphered value of the header belongs to the catalog established in the above step.Type: ApplicationFiled: February 15, 2001Publication date: December 20, 2001Inventors: Jeong-Hoon Park, Dong-Seek Park
-
Publication number: 20010054163Abstract: A method is provided for secured transfer of an N-byte data element from a first memory containing the data element to a second memory through a data bus that is connected between the first memory -and the second memory. According to the method, a transfer rule is defined with at least one parameter whose value is chosen at random before each transfer of the data element. The N-byte data element is transferred byte-by-byte through the data bus in accordance with the transfer rule, with each byte transiting once and only once through the data bus. In a preferred method, the transfer rule is a permutation of the bytes of the N-byte data element. Also provided is a programmable circuit having a random number generator that supplies at least one parameter of a data transfer rule.Type: ApplicationFiled: December 15, 2000Publication date: December 20, 2001Applicant: ST Microelectronics S.A.Inventor: Yannick Teglia
-
Publication number: 20010054164Abstract: In the semiconductor memory device, a control circuit generates various commands for a memory cell array according to an internal command control signal and an internal address signal output from an input switching circuit for switching an input source of the command control signals and the address signal between an external terminal and a BIST circuit. In the BIST mode, the input switching circuit cuts the signal input from the external terminal and generates the internal command control signal and the internal address signal according to an output signal from the BIST circuit. Transition to the BIST mode and return to the normal operation mode are indicated by a combination of signals supplied to the external terminal. Therefore, an interface between a built in BIST circuit and other internal circuits can be secured without an addition of a special interface specification.Type: ApplicationFiled: January 11, 2001Publication date: December 20, 2001Inventors: Tetsushi Tanizaki, Takeshi Hamamoto
-
Publication number: 20010054165Abstract: According to an aspect of the present invention, a redundant file memory for recording first replacement information having an address of a defective cell to be replaced with a redundant cell is configured by a memory cell having the same configuration as an ordinary memory cell, and when accessing the ordinary memory cell, the redundant file memory can be accessed at the same time. Furthermore, second replacement information indicating whether or not the ordinary cell in correspondence with the stored address is a defective one is recorded in the redundant file memory. When accessing the ordinary memory cell, the first and second replacement information recorded in the redundant file memory are read out at the same time, and the defective cell is replaced with the redundant cell according to the replacement information.Type: ApplicationFiled: February 15, 2001Publication date: December 20, 2001Applicant: Fujitsu LimitedInventor: Chikai Ono
-
Publication number: 20010054166Abstract: A LSI includes a logic circuit, a PLL circuit and a built-in self-test (BIST) circuit. When the PLL circuit detects a phase lock of the system clock signal of the LSI with a reference clock signal under the condition of presence of a test instruction signal, the PLL delivers a test enable signal to the BIST circuit. The BIST circuit responds to the test enable signal to test the logic circuit in a functional test. The BIST circuit transmits the test result data to an IC tester after the functional test. Throughput of the functional test can be improved by eliminating transmission of the test enable signal from the IC tester to the LSI.Type: ApplicationFiled: December 21, 2000Publication date: December 20, 2001Inventor: Yasuhiro Fukuda
-
Publication number: 20010054167Abstract: When recording digital data corresponding to a voice signal, a voice data recording and reproducing apparatus generates an error correction code and records this code together with the digital data in semiconductor memory. When transferring the digital data to the PC, a system control section in the voice data recording and reproducing apparatus transmits voice data including the error correction code without performing error correction. The system control section provides a lower data processing capability than that of a PC's CPU. The PC's CPU having a higher data processing capability performs error correction of the voice data by using the error correction code included in the received voice data.Type: ApplicationFiled: January 8, 2001Publication date: December 20, 2001Applicant: Olympus Optical Co., Ltd.Inventor: Hideo Okano
-
Publication number: 20010054168Abstract: A recording medium for storing real time recording/reproduction information, a real time recording and reproducing method and apparatus, and a file operating method using the information. Real time recording/reproduction information for ensuring real time recording/reproduction is stored in a file control information area, in each real time file, or in a separate file, and real time recording/reproduction attributes are assigned to the file. Thus, real time recorded files can be continuously reproduced without interruption. Also, there are methods of creating a file to which real time recording/reproduction attributes are assigned, extending a data area, and recording and reproducing the file to which real time recording/reproduction attributes are assigned.Type: ApplicationFiled: July 10, 2001Publication date: December 20, 2001Inventors: Hyun-Kwon Chung, Jung-Wan Ko, Byung-Jun Kim, Young-Yoon Kim, Do-Nam Lee
-
Publication number: 20010054169Abstract: A digital signal processing method and apparatus that provide a mechanism for controlling the output of digitally processed data in an optical disc player so as to reduce the probability of error and lost data during such output. In one aspect, an apparatus for processing information on an optical disc comprises a signal processor for processing a digital signal corresponding to an analog signal read from the optical disc to generate output data, a memory unit, operatively associated with the signal processor, for temporarily storing the output data in predetermined units under the control of the signal processor, and an output unit, operatively connected to the signal processor, for processing the output data based on the type of optical disc. The output unit generates a request signal that causes the signal processor to retrieve output data from the memory unit and transmit the retrieved output data to the output unit in parallel.Type: ApplicationFiled: April 30, 2001Publication date: December 20, 2001Applicant: Samsung Electronics Co., Ltd.Inventor: Tae-shik Joo
-
Publication number: 20010054170Abstract: A device and method for performing SISO coding in a parallel manner. Forward metrics and backward metrics computed in parallel. When forward metrics of nodes of a stage are computed and backward metrics of nodes of an adjacent stage were previously computed, the computation of forward metrics is integrated with the computation of a lambda from the stage to the adjacent stage, wherein when backward metrics of nodes of a stage are computed and the forward metrics of the nodes of an adjacent stage were previously computed, the computation of backward metrics is integrated with the computation of lambda from the stage to the adjacent stage.Type: ApplicationFiled: January 5, 2001Publication date: December 20, 2001Inventors: Amir Chass, Arik Gubeskys
-
Publication number: 20010054171Abstract: In the method of designing a semiconductor circuit having clock trees, a netlist is first generated. Then, a delay gates are inserted onto said netlist. Finally, inserted extra delay gates are deleted based on a timing constraint the clock trees is satisfied or not. As a consequence, skew between the clock trees can be easily adjusted.Type: ApplicationFiled: December 5, 2000Publication date: December 20, 2001Inventors: Mitsuaki Furumoto, Hiroomi Nakao
-
Publication number: 20010054172Abstract: A method and system for generating class definitions, XML serialization code, and validation logic from a XML document type definition (“DTD”) and associated enhanced syntax data. The generation is controlled by a schema compiler that includes a parser and a code generator. The parser inputs the XML DTD's and generates a syntax parse tree representation of the DTD's. The parser then annotates the syntax parse tree with enhanced syntax data. The code generator inputs the annotated syntax parse tree and generates the class definitions, the serialization code, and the validation logic.Type: ApplicationFiled: December 28, 2000Publication date: December 20, 2001Inventor: Jeffrey Taihana Tuatini
-
Publication number: 20010054173Abstract: A storage medium readable by a computer is used for storing a circuit module's interface information having high-level combinations each including first identifier sets and second identifier sets where:Type: ApplicationFiled: March 19, 2001Publication date: December 20, 2001Inventors: Koji Ara, Kei Suzuki, Kazuo Yano
-
Publication number: 20010054174Abstract: A programmable logic controller with enhanced and extended the capabilities. A digital input filter implement filters with considerable less logic by simulating the action of a capacitor being driven by a constant current source whose output voltage is sensed by a comparator with a large amount of hysterisis. A pulse catch circuit captures the input pulse even though the update occurs between scan cycles. A pulse output controller includes a hardware pipeline mechanism to allow for smooth, hardware-controlled transitions from wave-form to wave-form. A free port link allows the user to control the port either manually or by operation of a user program. In order to provide higher performance for communication using PPI protocol, the PLC includes a built-in protocol. An n-bit modem protocol ensures data integrity without use of a parity type data integrity system.Type: ApplicationFiled: December 8, 2000Publication date: December 20, 2001Applicant: Siemens Aktiengesellschaft.Inventors: Mark Steven Boggs, Temple L. Fulton, Steve Hausman, Gary McNabb, Alan McNutt, Steven W. Stimmel
-
Publication number: 20010054175Abstract: A program development support apparatus includes a CPU, event detection section, trace data generation section, and trace memory. The CPU executes a target program and outputs instruction address/instruction code data. The event detection section asserts and outputs a section trace start signal upon detecting that the instruction address/instruction code data matches a predetermined instruction address or instruction code set as an event condition in advance. When an instruction code of the instruction address/instruction code data is a branch instruction, or the section trace start signal is active, the trace data generation section outputs an uncompressed instruction address as trace data.Type: ApplicationFiled: March 28, 2001Publication date: December 20, 2001Applicant: NEC CorporationInventor: Katsumi Watanabe
-
Publication number: 20010054176Abstract: Computer executable logic is provided which comprises logic that extracts information and/or application front ends from a network or local resource; logic that manipulates and/or enhances extracted content to new looks and feels or with modified functionality; and logic that provides a mechanism by which complex transformations and applications can be constructed by composing any number of manipulation and extraction operations at run-time.Type: ApplicationFiled: February 8, 2001Publication date: December 20, 2001Inventors: Harrick M. Vin, Syed M. Husain
-
Publication number: 20010054177Abstract: An information processing apparatus that enables an undefined variable reference check on a dynamic variable. A dynamic variable specifying section specifies target dynamic variables from a source file. An area specifying section specifies areas ensured in the case of dynamic variables specified by the dynamic variable specifying means being developed into a memory at the time of executing a load module. An initializing section initializes areas specified by the area specifying means to a predetermined value.Type: ApplicationFiled: December 4, 2000Publication date: December 20, 2001Inventors: Koji Takahara, Masaki Aoki
-
Publication number: 20010054178Abstract: The present invention relates to a method for generating user history information of multimedia data, the present invention generates usage summary information by recording frequency of usage about the feature information of the multimedia data in a feature table, generates a user history list including link information (address) of the feature table in the usage summary information, and provides a user profile information for reflecting user preference by applying those information, therefor efficiently recording the feature information of multimedia data in limited space, and providing a user-oriented multimedia service to the user.Type: ApplicationFiled: March 13, 2001Publication date: December 20, 2001Applicant: LG Electronics Inc.Inventors: Jin Soo Lee, Kyoung Ro Yoon
-
Publication number: 20010054179Abstract: The present invention detects that a viewed broadcast program becomes unviewable due to a viewing restriction and automatically selects another predefined viewable broadcast program. The present invention also uses the same screen to display a message notifying that a viewed broadcast program becomes unviewable due to a viewing restriction and a selected viewable broadcast program.Type: ApplicationFiled: March 5, 2001Publication date: December 20, 2001Inventors: Koichi Nakamura, Yuko Yamazaki
-
Publication number: 20010054180Abstract: A system, method and apparatus for synchronizing output of media in a public space. Different types of media elements, related to one another, are output at related times to different devices within a public space. The timing may be adjusted over a wide range, or a narrow range, to handle a wide range of needs. General programming media elements are selected for output in a public space based upon a source indicating available media elements, and upon transient variables especially pertinent to the public space, which are provided independently of user inputs. Metadata media related to but distinct from an output programming media element may be independently selected for output to different devices, via different signal paths and protocols.Type: ApplicationFiled: January 8, 2001Publication date: December 20, 2001Inventor: Paul D. Atkinson
-
Publication number: 20010054181Abstract: Methods and systems for forced advertising are provided. These methods and systems determine when a forced advertisement is to be presented, determine what forced advertisement is to be presented, and control how the forced advertisement is to be presented. A forced advertisement may be received prior to the time at which the forced advertisement is to be presented or when needed. The forced advertisement may be presented when certain broadcast advertisements are being broadcast, at certain times of the day, or at certain times within a program. The forced advertisements may be selected based upon content of a replaced broadcast advertisement, content of a nearby program, or independently of any broadcast-related factors. Finally, forced advertisements may be presented so that a television viewer cannot escape viewing the advertisement by changing channels or turning off the television.Type: ApplicationFiled: February 1, 2001Publication date: December 20, 2001Inventor: Johnny B. Corvin
-
Publication number: 20010054182Abstract: To enable a user of a television set connected to a decoder having access to a remote data source to access preferred messages for display at high speed, these messages are stored in a back-up memory of the decoder and updated at predetermined dates, or even occasionally. Thus a mini-Internet is created in the decoder, but it is a network that is regularly updated. Thus the time needed to access the message for display is reduced to the time needed to access the back-up memory in the decoder.Type: ApplicationFiled: April 23, 2001Publication date: December 20, 2001Inventor: Patrick Lodola
-
Publication number: 20010054183Abstract: A viewer-defined group of channels allows a viewer to quickly navigate through the channels in the group. A channel matrix is used to display channels having program types or transmission characteristics that are selected by a user in a manner that allows the viewer to quickly select one of these channels. The channel matrix includes rows and columns of channel numbers, each corresponding to one channel in a group of channels. Channels having any of the selected program types or features are highlighted in the matrix. The viewer selects a program type or transmission characteristic using a menu. The program types may be predefined or defined by the viewer according to a set of parameters.Type: ApplicationFiled: December 19, 2000Publication date: December 20, 2001Inventor: Matthew R. Curreri
-
Publication number: 20010054184Abstract: A data display control apparatus receives a digital broadcast and compares the present time with a time indicated in a Time_Event_Part provided in navigation information used to control the display of the multimedia data composing a broadcast program. When the indicated time has been reached, the data display control apparatus executes instructions to control the display of the multimedia data.Type: ApplicationFiled: March 21, 2001Publication date: December 20, 2001Inventors: Shigeaki Watanabe, Kazutoshi Sumiya, Kiyokazu Yamanaka, Yuki Kusumi, Masahiro Oashi, Tatsuya Shimoji, Masayuki Kozuka, Yoshihiro Mimura, Yoshiyuki Miyabe, Kazuo Okamura, Takashi Kakiuchi, Junichi Hirai, Naoya Takao, Toshiya Mori, Ikuo Minakata
-
Publication number: 20010054185Abstract: The invention relates to transgenic mammals characterized by 5-HT3 receptor over-expression in the central nervous system (CNS). The mammals have particular utility as models for studying the role of 5-HT3 receptors in the CNS, especially for the study of reward pathways for alcohol and other substances of abuse.Type: ApplicationFiled: June 26, 2001Publication date: December 20, 2001Inventors: Andrea M. Allan, Sharon R. Engel, Clifford R. Lyons
-
Publication number: 20010054186Abstract: The present invention relates to a rapid transformation and regeneration system for plants. In particular, the invention relates to a plant tissue preparation system. The transformation method is efficient and reliable for production of fertile plants with improved agronomic qualities.Type: ApplicationFiled: December 10, 1999Publication date: December 20, 2001Inventors: MING CHENG, JOYCE E FRY
-
Publication number: 20010054187Abstract: Disclosed herein is a Verbena plant which has erect growth habit and good plant height. The plant has plentiful flowers in a spike, and great profusion of blooms. The blooming period is late April to November and flowering duration is long. The whole bush remains in bloom for a considerable period of time. The flower size is large and the petal color of the flowers is vivid reddish purple without eye. The plant is highly tolerant to heat and cold, and has high resistances to pests and diseases, particularly powdery mildew, and high resistance to rain.Type: ApplicationFiled: August 17, 1999Publication date: December 20, 2001Inventors: YUKI WATANABE, RYUICHI TACHIBANA