06th week of 2015 patent applcation highlights part 68 |
Patent application number | Title | Published |
20150040195 | METHOD AND APPARATUS FOR ASSOCIATING STATION (STA) WITH ACCESS POINT (AP) - The present invention relates to a method and apparatus for associating a station (STA) with an access point (AP). The method for associating a first AP with an STA in a wireless LAN includes the steps of: a first AP receiving an association request frame from the STA; the first AP requesting authentication information on the STA from a second AP with which the STA was previously associated; the first AP receiving authentication information on the STA from the second AP, wherein the first and second AP's are linked by a distribution system, the association request frame includes identification information on the second AP, and the authentication information on the STA can include at least one of a paired main key (PMK) and a recertification main session key (rMSK). Accordingly, fast association between the STA and the AP can be achieved by a simplified authentication procedure without repeating a full authentication procedure. | 2015-02-05 |
20150040196 | NETWORK CONNECTING DEVICE, SYSTEM AND METHOD FOR SAME - A network connecting device communicates with a network providing device and a terminal device. The network providing device can send authorization information for providing a network. The terminal device can send a request for sharing the network. The network connecting device obtains the authorization information sent by the network providing device and the request sent by the terminal device. The network connecting device connects the terminal device to the network provided by the network providing device according to the authorization information. A network connecting system and method are also provided. | 2015-02-05 |
20150040197 | SYSTEM FOR MANAGING RESOURCES ACCESSIBLE TO A MOBILE DEVICE SERVER - A system that incorporates teachings of the present disclosure may include, for example, a non-transitory computer-readable storage medium operating in a mobile device server having computer instructions to execute a web server application in the mobile device server. The web server application can be operable to detect a resource control manager while roaming in a communication zone of the resource control manager, and to transmit a pairing key to the resource control manager. The web server application can also be operable to receive from the resource control manager authorization to pair with one or more resources selected by the resource control manager according to the pairing key, and to establish communications with the one or more resources selected by the resource control manager. Other embodiments are disclosed. | 2015-02-05 |
20150040198 | SYSTEMS AND METHODS FOR ACCESSING A DEVICE USING A PAIRED DEVICE IN ITS PROXIMITY - This disclosure relates to systems and methods for accessing a device using a paired device in its proximity. In one embodiment, a resource sharing method is disclosed, comprising: obtaining a proximal device identifier associated with a proximal device; identifying a proximal device profile associated with the proximal device identifier; retrieving access privilege data stored in the proximal device profile; generating, via a processor, user interface data based on the access privilege data; and providing the user interface data for display. The method may further comprise: providing, for the proximal device, an authentication key identifier and a request for user security input format data; obtaining, from the proximal device: an authentication key associated with the authentication key identifier, and user security input format data; determining that the proximal device is authenticated, based on the authentication key; and displaying a user security input interface based on the user security input format data. | 2015-02-05 |
20150040199 | METHOD FOR ACCESSING A PLURALITY OF SERVICES BY A MOBILE TERMINAL USER, AND RELATED SECURE DEVICE - The invention relates to a method for enabling the user of at least one mobile terminal to access a plurality of services, said method consisting of: creating (E | 2015-02-05 |
20150040200 | METHOD FOR AUTHENTICATING A DEVICE CONNECTION FOR WEBSITE ACCESS WITHOUT USING A WEBSITE PASSWORD - A method herein is for authenticating a device connection for website access without using a website password. In the method, a web server receives an access request over the device connection from a device requesting access to a website based on a pre-established identity. The web server, in response to the access request, forwards an access cookie to the device over the device connection and forwards an activation URL to an address associated with the pre-established identity. The web server receives a request for the forwarded activation URL and, using the access cookie, grants access to the device over the device connection. | 2015-02-05 |
20150040201 | REGISTERING A MOBILE APPLICATION WITH A SERVER - In an example embodiment, a test request is sent to a server configured to provide data to the mobile device application. Then a response to the test request is received from the server. The response is analyzed to identify a pattern in the response indicative of a communication sent via a particular communication path. An available communication path between the mobile device application and the server corresponding to the pattern is identified. Then, a mobile device application is registered with the server via the identified communication path. | 2015-02-05 |
20150040202 | IMAGE FORMING APPARATUS AND METHOD OF AUTHENTICATING USER THEREOF - A method of authenticating a user of an image forming apparatus is provided that includes receiving, at the image forming apparatus, a one-time password (OTP) generating request, generating, at the image forming apparatus, an OTP according to the OTP generating request, receiving, at the image forming apparatus, an authentication request, from the host apparatus, including the OTP, and when the OTP received from the host apparatus matches the OTP generated according to the OTP generating request and absent a condition, approving an access to the image forming apparatus. | 2015-02-05 |
20150040203 | AUTHENTICATION METHOD OF WEARABLE DEVICE AND WEARABLE DEVICE - The present invention relates to the information security field and discloses an authentication method of a wearable device, and a wearable device. The authentication method includes: determining whether a user is a preset user of a wearable device; if the user is the preset user, acquiring verification information of an electronic device, where the verification information is used for authenticating the user by the electronic device; and sending the verification information to the electronic device. | 2015-02-05 |
20150040204 | METHOD AND SYSTEM FOR ABSTRACTED AND RANDOMIZED ONE-TIME USE PASSWORDS FOR TRANSACTIONAL AUTHENTICATION - A security system and method for authenticating a user's access to a target system is disclosed. The security system receives an authentication request from the user and generates a security matrix which comprises a mapping between each symbol within a symbol set and a code value randomly selected from a distinct code set. The number of elements in the symbol set and in the code set are selected to provide a predetermined level of security against capture of a user-defined keyword by an unauthorised observer. The security system sends the security matrix to the user and awaits a one-time code in response. The user forms the one-time code based on the user keyword and the security matrix. The security system validates the one-time code against the security matrix and the keyword to determine an authentication result, permitting or denying the user access to the target system. | 2015-02-05 |
20150040205 | System and Method for Physical Access Control - The present invention provides, in one aspect, a system and method for managing authentication tokens that operate across multiple types or physical resources binding the tokens to one or more external electronic Identity Providers; generating tokens; authenticating the tokens at multiple physical resources; managing access to physical resources by linking the tokens to the electronic identities; translating the tokens to the appropriate physical token type based on infrastructure services available at the point of service; validating tokens at the physical resource; tracking and conveying usage information; and making use of social group relationships and other data defined by individual usage to, among other things, simplify the process of granting user-generated credentials to persons connected to a given individual via the Identity Provider or an external social network, for example. | 2015-02-05 |
20150040206 | SYSTEMS FOR FINDING A LOST TRANSIENT STORAGE DEVICE - Processes for identifying and recovering a lost transient storage device are provided. In some processes, information regarding the owner of the device is obtained. The device ownership information may be stored on a remote service with which the device is registered and/or may be stored on the device itself. In one process, the remote service provides the device with customized device-executable code when the device is registered. The device may also contain information regarding trusted systems. The process includes obtaining status information indicating whether a device is lost when the device is connected to a host system. In some processes, the status is determined by a remote service. In other processes, the status is determined by the device. If the device is lost then a device recovery plan is executed. Portions of a device recovery plan may be executed on the remote service, the host system, and/or the device. | 2015-02-05 |
20150040207 | METHODS AND APPARATUS TO FORM SECURE CROSS-VIRTUAL PRIVATE NETWORK COMMUNICATION SESSIONS - Example methods and apparatus to form secure cross-VPN (virtual private network) communication sessions in multiprotocol label switching (MPLS)-based networks are disclosed. An example method comprises sending a first border gateway protocol route advertisement to a first provider edge router associated with a first one of two multiprotocol label switched-based virtual private networks in response to receiving a cross-virtual private network link setup request from an application server, the route advertisement comprising a flow-spec parameter, and the setup request identifying a communication path between two user devices associated with the first and second multiprotocol label switched-based virtual private networks, sending a second border gateway protocol route advertisement to a second provider edge router associated with the second multiprotocol label switched-based virtual private network, and restricting a communication session between the two user devices of the first and second multiprotocol label switched-based virtual private networks to a first protocol for a threshold period of time based on a restriction parameter shared by the communication path. | 2015-02-05 |
20150040208 | METHOD FOR OPERATING MULTI-DOMAIN PROVIDER ETHERNET NETWORKS - A method of enabling extension of a network service of a first domain to a remote customer site hosted by an Access Gateway (AG) in a Provider Ethernet domain. In the first domain, the remote customer site is represented as being hosted by a border gateway (BG) connected to the Provider Ethernet domain, such that subscriber packets associated with the network service are forwarded to or from the remote customer site via the BG. In the Provider Ethernet domain, a trunk connection is instantiated through the Provider Ethernet domain between the host AG and the BG. A trunk cross-connection function is installed in the host AG, for transferring subscriber packets associated with the network service between a respective attachment virtual circuit (AVC) through which the remote customer site is connected to the host AG and an extended AVC tunnelled through the trunk connection. A common service instance identifier (I-SID) is used to identify both the AVC between the host AG and the remote customer site and the extended AVC between the host AG and the BG. | 2015-02-05 |
20150040209 | SYSTEM AND METHOD FOR APPLICATION SPECIFIC LOCKING - An unlocking application limits access to a computer application on a computing device. The unlocking application is configurable with at least one unlocking command comprising a sequence of inputs received by input devices of the computing device. The unlocking application limits access to at least one of the computer applications by requiring a user of the computing device to provide the at least one unlocking command using the input devices to access the at least one computer application. | 2015-02-05 |
20150040210 | CONTROLLING A CURRENT ACCESS MODE OF A COMPUTING DEVICE BASED ON A STATE OF AN ATTACHMENT MECHANISM - A computing device can receive an indication of a change in the proximity state of a first structure of an attachment mechanism and a second structure of the attachment mechanism. Responsive to receiving the indication, the computing device can be operable to change, based at least in part on the indication, a current access mode provided by the computing device. In some examples, both the computing device and the attachment mechanism may be part of a wearable computing device. In other examples, the computing device may be or be part of a physically separate device from the attachment mechanism. | 2015-02-05 |
20150040211 | MOTION INPUT DEVICE FOR PORTABLE TERMINAL AND OPERATION METHOD USING THE SAME - The present invention relates to a motion input device for portable terminal and an operation method using the same. A motion input device of a portable terminal of the present invention includes a sensor unit configured to collect a sensor signal from at least one sensor; an operation recognition unit configured to generate a motion signal corresponding to an operation of portable terminal based on the sensor signal; a scenario preparation unit configured to generate an input scenario based on at least one motion signal; and a scenario mapping unit configured to detect, in a scenario database, a standards scenario corresponding to the input scenario, and to generate an input signal corresponding to the standards scenario. | 2015-02-05 |
20150040212 | LOCKING APPARATUS WITH ENHANCED SECURITY USING IRIS IMAGE - The present invention relates to a locking apparatus with enhanced security using an iris image, wherein, if a terminal including a short-range wireless communication means and camera accesses the locking apparatus, the locking apparatus: transmits, a token comprising at least one of identification number and/or random number of the locking apparatus from a token generator mounted on the locking apparatus, to the terminal; requests an iris image be photographed and transmitted within a preset time period; generates an iris template from the iris image photographed by a camera fixed on the user terminal; encrypts and transmits the generated iris template and the token from the terminal to the locking apparatus using short-range wireless communication; and performs at least one of access permission (lock release), access denial (a maintenance of a locked state), a request for re-photographing, and an emergency alarm by decrypting the received encrypted iris template and token using a decoder mounted on the locking apparatus, and comparing the similarity thereof with an iris template registered and stored in a database in advance. | 2015-02-05 |
20150040213 | DEVICE, METHOD, AND GRAPHICAL USER INTERFACE FOR INTEGRATING RECOGNITION OF HANDWRITING GESTURES WITH A SCREEN READER - While an electronic device with a display and a touch-sensitive surface is in a screen reader accessibility mode, the device displays an application launcher screen including a plurality of application icons. A respective application icon corresponds to a respective application stored in the device. The device detects a sequence of one or more gestures on the touch-sensitive surface that correspond to one or more characters. A respective gesture that corresponds to a respective character is a single finger gesture that moves across the touch-sensitive surface along a respective path that corresponds to the respective character. The device determines whether the detected sequence of one or more gestures corresponds to a respective application icon of the plurality of application icons, and, in response to determining that the detected sequence of one or more gestures corresponds to the respective application icon, performs a predefined operation associated with the respective application icon. | 2015-02-05 |
20150040214 | Method for Starting Application Program and Terminal Device Having Touchscreen - A method for starting an application program on a terminal device that has a touchscreen can be used to start at least one application program during unlocking. The method includes displaying, in a first sensing area, an application program to be displayed; and in a case that the first trigger signal is detected in the first sensing area and a second trigger signal is detected in a second sensing area, unlocking the touchscreen and starting an application program triggered by the first trigger signal. | 2015-02-05 |
20150040215 | REMOTE CUSTOMER RELATIONSHIP MANAGEMENT ACTIVITY WORKSPACE - A secure activity workspace including a monitoring device connected to a power source and a managed router and a monitoring router connected to a communication channel, and the managed router and a power source wherein the monitoring device controls the managed router. | 2015-02-05 |
20150040216 | Systems and Methods for Restricting Application Binary Interfaces - Systems and methods for restricting application binary interfaces. An example method may comprise: initializing, by a process spawned by a kernel of an operating system running on a computer system, a system call filter inhibiting at least one type of application binary interface (ABI) calls; receiving a system call issued by a user space program executed by the computer system; intercepting the system call by the system call filter; determining that the system call is disabled by the system call filter; and performing a pre-determined action with respect to the system call. | 2015-02-05 |
20150040217 | DATA PROTECTION IN A NETWORKED COMPUTING ENVIRONMENT - An approach for monitoring and protecting electronic data in a networked computing environment (e.g., a cloud computing environment) is provided. In a typical embodiment, an activity monitor gathers characteristics of data traffic of one or more virtual machines. The data traffic is analyzed to determine whether any of the data traffic is indicative of a malicious activity (e.g., unauthorized data transfers). If it appears a VM is engaging in malicious activity, then a counter for the VM is incremented by a predefined value that is associated with the malicious activity. When the counter for the VM exceeds a point threshold, a remediation action is taken with respect to the VM. | 2015-02-05 |
20150040218 | DETECTING IMAGE SPAM - Methods and systems for operation upon one or more data processors for detecting image spam by detecting an image and analyzing the content of the image to determine whether the incoming communication comprises an unwanted communication. | 2015-02-05 |
20150040219 | USER EVALUATION - Improving the integrity of a computer system including a plurality of user accounts by, for each user account, monitoring events on the computer system that are related to the user account, assigning an importance score to the monitored user account that is indicative of the importance of the monitored user account to the integrity of the computer system, the importance score being calculated from the monitored events, and providing the importance score to a system administrator upon the administrator attempting to alter the monitored user account. | 2015-02-05 |
20150040220 | System and Method for Unified Communications Threat Management (UCTM) for Converged Voice, Video and Multi-Media Over IP Flows - A method and system for unified communications threat management (UCTM) for converged voice and video over IP is disclosed. A computer-implemented method for threat management receives an incoming packet. The incoming packet is broken into sub-packets and fed to a plurality of packet processing engines. Each packet processing engine inspects the sub-packets and annotate the sub-packets with meta-data. The annotated sub-packets are combined and processed by a plurality of application engine to generate a processed packet. The processed packet is classified and stored in a database. | 2015-02-05 |
20150040221 | SERVER WITH MECHANISM FOR CHANGING TREATMENT OF CLIENT CONNECTIONS DETERMINED TO BE RELATED TO ATTACKS - According to certain non-limiting embodiments disclosed herein, the functionality of a server is extended with a mechanism for identifying connections with clients that have exhibited attack characteristics (for example, characteristics indicating a DoS attack), and for transitioning internal ownership of those connections such that server resources consumed by the connection are reduced, while keeping the connection open. The connection thus moves from a state of relatively high resource use to a state of relatively low server resource use. According to certain non-limiting embodiments disclosed herein, the functionality of a server is extended by enabling the server to determine that any of a client and a connection exhibits one or more attack characteristics (e.g., based on at least one of client attributes, connection attributes, and client behavior during the connection, or otherwise). As a result of the determination, the server changes its treatment of the connection. | 2015-02-05 |
20150040222 | DETECTING AND REACTING TO INAPPROPRIATE EQUIPMENT AND PROGRAMMING IN A COMPUTER SYSTEM WITHOUT GENERATING ALERTS TO UNAUTHORIZED USERS OF THE DETECTION - A method, computer program product and system of detecting changes in hardware, software, or programming of a device in a computer system by a computer in the system coupled to the device through a network, without generating alerts or alerting unauthorized users of the detection of the changes. | 2015-02-05 |
20150040223 | SYSTEMS AND METHODS FOR DEFEATING MALWARE WITH POLYMORPHIC SOFTWARE - Systems and methods for defeating malware with polymorphic software are described. The system generates randomized relocatable image information by randomizing a plurality of function information that is included in relocatable image information. The plurality of function information includes a first function information. The first function information includes a first location that is used to enter the first function information. The randomizing further includes updating instruction information in the randomized relocatable image information. Updating the instruction information further includes updating relative address information utilized to enter the first function via the first location based on a new location of the first function in the randomized relocatable image information. The system further applies a base address to the randomized relocatable image information to generate randomized executable image information, loads the randomized executable image information into the memory, and executes the randomized executable image information. | 2015-02-05 |
20150040224 | Method And System For Dynamic Platform Security In A Device Operating System - A system and method is provided for implementing platform security on a consumer electronic device having an open development platform. The device is of the type which includes an abstraction layer operable between device hardware and application software. A secure software agent is provided for embedding within the abstraction layer forming the operating system. A secure store is provided for storing security information unique to one or more instances of the application plication software. The secure software agent uses the security information for continuous runtime assurance of ongoing operational integrity of the operating system and application software and thus operational integrity of the device. | 2015-02-05 |
20150040225 | BLACKLISTING AND WHITELISTING OF SECURITY-RELATED EVENTS - A disclosed computer-implemented method includes receiving and indexing the raw data. Indexing includes dividing the raw data into time stamped searchable events that include information relating to computer or network security. Store the indexed data in an indexed data store and extract values from a field in the indexed data using a schema. Search the extracted field values for the security information. Determine a group of security events using the security information. Each security event includes a field value specified by a criteria. Present a graphical interface (GI) including a summary of the group of security events, other summaries of security events, and a remove element (associated with the summary). Receive input corresponding to an interaction of the remove element. Interacting with the remove element causes the summary to be removed from the GI. Update the GI to remove the summary from the GI. | 2015-02-05 |
20150040226 | DATUM READING ERROR DETECTION METHOD - There is disclosed a method for detecting an error in the reading of a data item, this method includes | 2015-02-05 |
20150040227 | SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR PREVENTING A MODIFICATION TO A DOMAIN NAME SYSTEM SETTING - A system, method, and computer program product are provided for preventing a modification to a domain name system setting. In use, an attempt to modify a domain name system setting is detected. Additionally, a source of the attempt and an attribute of the modification are verified. Further, the modification to the domain name system setting is prevented, based on the verification. | 2015-02-05 |
20150040228 | SELECTION OF A COUNTERMEASURE - Examples disclose a method, executable by a processor, to assign a metric of vulnerability to a virtual machine. Based on the metric of vulnerability, the method places the virtual machine into a detection phase. Additionally, the examples disclose the method is to receive an alert corresponding to the virtual machine and based this received alert, the method implements a countermeasure. | 2015-02-05 |
20150040229 | DYNAMIC SECURITY TESTING - A method and system for discovering and testing security assets is provided. Based on source definition data describing sources to monitor on the one or more computer networks, an example system scans the sources to identify security assets. The system analyses the security assets to identify characteristics of the server-based applications. The system stores database records describing the security assets and the identified characteristics. The system queries the database records to select, based at least on the identified characteristics, one or more target assets, from the security assets, on which to conduct one or more security tests. Responsive to selecting the one or more target assets, the system conducts the one or more security tests on the one or more target assets. The system identifies one or more security vulnerabilities at the one or more target assets based on the conducted one or more security tests. | 2015-02-05 |
20150040230 | MULTI-PATH REMEDIATION - A system, method, and computer program product are provided for a database associating a plurality of device vulnerabilities to which computing devices can be subject with a plurality of remediation techniques that collectively remediate the plurality of device vulnerabilities. Each of the device vulnerabilities is associated with at least one remediation technique. Each remediation technique associated with a particular device vulnerability remediates that particular vulnerability. Further, each remediation technique has a remediation type are selected from the type group consisting of patch, policy setting, and configuration option. Still yet, a first one of the device vulnerabilities is associated with at least two alternative remediation techniques. | 2015-02-05 |
20150040231 | COMPUTER PROGRAM PRODUCT AND APPARATUS FOR MULTI-PATH REMEDIATION - A system, method, and computer program product are provided for a database associating a plurality of device vulnerabilities to which computing devices can be subject with a plurality of remediation techniques that collectively remediate the plurality of device vulnerabilities. Each of the device vulnerabilities is associated with at least one remediation technique. Each remediation technique associated with a particular device vulnerability remediates that particular vulnerability. Further, each remediation technique has a remediation type are selected from the type group consisting of patch, policy setting, and configuration option. Still yet, a first one of the device vulnerabilities is associated with at least two alternative remediation techniques. | 2015-02-05 |
20150040232 | ANTI-VULNERABILITY SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT - A system, method, and computer program product are provided for identifying a first and second occurrence in connection with at least one of the networked device. In use, it is possible that it is determined that the at least one actual vulnerability of the at least one networked device is capable of being taken advantage of by the first occurrence identified in connection with the at least one networked device. Further, it is also possible that it is determined that the at least one actual vulnerability of the at least one networked device is not capable of being taken advantage of by the second occurrence identified in connection with the at least one networked device. To this end, the first occurrence and the second occurrence are reported differently. | 2015-02-05 |
20150040233 | SDK-EQUIPPED ANTI-VULNERABILITY SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT - A system, method, and computer program product are provided including a vulnerability component and a software developer kit (SDK) for allowing access to the vulnerability component via an application program interface (API) for causing an action to be automatically completed in connection with at least one networked device that is actually vulnerable to at least one actual vulnerability. | 2015-02-05 |
20150040234 | Implementing Role Based Security in an Enterprise Content Management System - A method of implementing role based security in an enterprise content management system is provided and may include creating a role object; creating a role adapter object that is communicatively coupled to the created role object; creating a security adapter object that is communicatively coupled to the created role adapter object; and associating the security adapter object to a content class. | 2015-02-05 |
20150040235 | COERCED ENCRYPTION ON CONNECTED DEVICES - Techniques for coercing users to encrypt synchronized content stored at their personal computing devices. In some aspects, one or more computing devices receive, from a personal computing device, an indication of whether data stored in at least a portion of a storage device of the personal computing device is protected by disk encryption. In response to determining, based on the indication, that the portion of the storage device is not protected by encryption, synchronization data for synchronizing a copy of one or more synchronized content items stored in the portion of the storage device with another copy of the synchronized content items stored at one or more server computing devices is withheld from the personal computing device until disk encryption on the personal computing device is enabled so as to coerce the user to enable disk encryption on the personal computing device. | 2015-02-05 |
20150040236 | ADDING RANDOMIZATION TO AUTOMATED PROCESS FLOWS - A method, system and article of manufacture for adding randomness to a process used to achieve a specified objective. In one embodiment, the method comprises defining a multitude of solution paths through the process for achieving the specified objective; storing the paths as process workflows; and in response to a specified event, choosing one of the solution paths at random and executing the process, using the chosen solution path, to achieve the specified objective. In an embodiment, the process includes a specified number of steps; and the solution paths are defined by defining a multitude of orders of the steps, each of the orders, when executed, achieving the specified result. In one embodiment, at least a plurality of the steps includes one or more parameters; and a range of values is defined for at least one of the parameters of at least one of the steps. | 2015-02-05 |
20150040237 | SYSTEMS AND METHODS FOR INTERACTIVE CREATION OF PRIVACY SAFE DOCUMENTS - Embodiments relate to systems and methods for interactive creation of privacy safe documents. In aspects, an online document processing system can be configured to include a text editor with a set of privacy controls. The text editor can interact with a remote privacy engine to scan an original document entered by a user, to seamlessly detect potentially sensitive data such as medical information contained in that document as it is entered. When potentially sensitive data is identified, for instance by checking the entered content, data fields or formats of a Web form, the privacy engine can generate text substitution data to transmit to the text editor. Potentially sensitive data, such as social security numbers or other personal or private identifiers, can therefore be masked redacted to export to Web sites, users or services without exposing potentially sensitive data. | 2015-02-05 |
20150040238 | METHOD AND DEVICE FOR IMPROVING SUBSCRIBERS PRIVACY IN IP COMMUNICATIONS NETWORKS - A method and devices for improving privacy of subscribers of a service provider IP network are disclosed. The service provider has a worldwide unique collection of global IP addresses to be used by their subscribers and the region served by the service provider is divided in different zones, the service provider having for each zone a network node, called IP address assigner node, which assigns unique global IP addresses to the subscribers located in said zone. The disclosed method and devices increase the privacy disabling the non authorized IP geolocation by third parties without the need of additional computational efforts and strong investments in the network. | 2015-02-05 |
20150040239 | SYSTEMS AND METHODS FOR MANAGING LOST DEVICES OF MULTIPLE TYPES WITH MULTIPLE POLICIES USING MELDED PROFILES ASSOCIATED WITH GROUPS - This disclosure facilitates managing lost devices. In some embodiments, a system receives a first device type from a first agent on a first device, and a different second device type from a second agent on a second device. The system receives a first group associated with the first device and a different second group associated with the second device. The system determines that the first device and the second device are lost and accesses a database storing first and second configuration classes associated with the first and second devices, respectively. The system creates first and second device-dependent classes based on the first and second device types and the first and second configuration classes, respectively. The system melds the first device-dependent class into a first melded profile and the second device-dependent class into a second melded profile, using the respective groups, and applies the melded profiles to the corresponding device. | 2015-02-05 |
20150040240 | SYSTEM AND METHOD FOR SOFTWARE PIRACY MONETIZATION - A method includes the steps of: providing a software product configured to run on a local computer and to perform a piracy monetization checksum based process; providing a list of valid checksums for a distribution filename of the software product version; connecting by computer the local computer with a software company server; identifying by computer a unique computer identification of the local computer; following a launch, sending the unique computer identification and a checksum of at least one distribution filename on the local computer to the software company server; comparing at the software company server the checksum to the list of valid checksums; and responsive to the step of comparing on detection of a non-authorized checksum, sending a message from the software company server to the local computer, the message configured to perform a piracy monetization action. A method using checksums and serial numbers is also described. | 2015-02-05 |
20150040241 | METHOD AND SYSTEM FOR SECURE CONTENT DISTRIBUTION BY A BROADBAND GATEWAY - A broadband gateway, which enables communication with a plurality of devices, handles at least one physical layer connection to at least one corresponding network access service provider. Security boundaries such as conditional access (CA) and/or digital right management (DRM) boundaries associated with the broadband gateway are identified based on security profiles associated with the plurality of devices and/or a service from networks. The identified security boundaries are utilized to determine or negotiate CA information for content access for the service. The received content may be distributed according to the determined CA information and the security profiles of the corresponding devices. The broadband gateway may be automatically and dynamically configured based on the identified security boundaries to secure content distribution to the devices. Content distribution security schemes, for example, super encryption, simul-crypt, IPSec and/or watermarking, may be selected by matching the CA information with corresponding device security profiles. | 2015-02-05 |
20150040242 | ENHANCED PRIVACY FOR PROVISION OF COMPUTER VISION - Methods, apparatuses and storage medium associated with providing enhanced privacy during usage of computer vision are disclosed. In embodiments, an apparatus may include one or more privacy indicators to indicate one or more privacy conditions of the apparatus in association with provision of computer vision on the apparatus. The apparatus may further include a privacy engine coupled with the one or more privacy indicators, and configured to pre-process images from an image source of the apparatus associated with the provision of computer vision to the apparatus, to increase privacy for a user of the apparatus, and to control the one or more privacy indicators. In embodiments, the apparatus may include means for blanking out one or more pixels with depth values identified as greater than a threshold. Other embodiments may be described and claimed. | 2015-02-05 |
20150040243 | LIMITED-ACCESS STATE FOR INADVERTENT INPUTS - Techniques for a computing device operating in access-states are provided. One example method includes receiving, by the computing device operating in a first access state, an indication of first input and responsive to determining that at least one value of a characteristic of the first input exceeds a predetermined characteristic threshold, transitioning the computing device to operate in a second access state. While the computing device is operating in the second access state, the method further includes outputting instructions for transitioning the computing device from operating in the second access state. The method further includes receiving, by the computing device operating in the second access state, an indication of a second input and responsive to determining that the indication of the second input satisfies a threshold of compliance with the instructions, transitioning the computing device from operating in the second access state to operating in the first access state. | 2015-02-05 |
20150040244 | System And Method For Communications Routing - Provided is a system which allows a user to efficiently locate and contact those individuals the user would like to communicate with. The system can also collect or access data about users in order to determine the best contact point to use at a particular time. Some of the data may include information pertaining to a user's appointments, schedule, activities, location and/or contact point usage. The system can monitor the data and may determine an individual's usage patterns in order to select or suggest contact points that are the best to contact a particular user at a particular time. The system may also determine or receive settings that allow for the routing of communications to particular contact points based on how the user receiving the communication would prefer to be contacted. Further, the system may securely route sensitive communications and prevent or limit forwarding of the sensitive information. | 2015-02-05 |
20150040245 | PRIVACY-PRESERVING MATCHING SERVICE - Described herein are technologies pertaining to protecting user privacy in connection with attribute-based matching services. A user registers with a platform that includes a plurality of non-collaborating partitions, where registration includes transmitting a message to the platform that indicates that the user has one or more attributes corresponding thereto. Through selective encryption and a communications protocol amongst the partitions, none of the partitions are able to ascertain that the user has the attributes. Acting in conjunction, however, the plurality of partitions perform rich attribute-based matching. | 2015-02-05 |
20150040246 | CENTRALIZED SELECTIVE APPLICATION APPROVAL FOR MOBILE DEVICES - A system and method for confirming an application change event associated with a device infrastructure of a mobile device, the method comprising the steps of: storing an application authorization list identifying a plurality of mobile applications, the application authorization list being remote from the mobile device over a communications network; receiving an application authorization request from the mobile device over the communications network, the application authorization request including application identification information; comparing the application identification information with one or more listed mobile applications of the plurality of mobile applications identified in the application authorization list; determining whether the application information matches any of the plurality of mobile applications to produce a decision instruction containing an authorization decision; and sending the decision instruction to the mobile device for subsequent processing of the decision instruction by a mobile agent associated with the device infrastructure; wherein processing of the decision instruction provides for confirmation of the application change event. | 2015-02-05 |
20150040247 | METHOD AND APPARATUS FOR INFORMATION CARRIER AUTHENTICATION - The present invention relates to a method of enabling authentication of an information carrier, the information carrier comprising a writeable part and a physical token arranged to supply a response upon receiving a challenge, the method comprising the following steps; applying a first challenge to the physical token resulting in a first response, and detecting the first response of the physical token resulting in a detected first response data, the method being characterized in that it further comprises the following steps; forming a first authentication data based on information derived from the detected first response data, signing the first authentication data, and writing the signed authentication data in the writeable part of the information carrier. The invention further relates to a method of authentication of an information carrier, as well as to devices for both enabling authentication as well as authentication of an information carrier. | 2015-02-05 |
20150040248 | ENCRYPTION-RESISTANT WATERMARKING - A method and system for processing data is described, the method and system including encoding a string of symbols, each having a respective symbol value, as a sequence of vectors, each vector including a respective number of repetitions of a sub-vector of a predefined length, such that the respective number of the repetitions in each vector in the sequence is indicative of the respective symbol value of a corresponding symbol in the string, and applying a watermark to an item of content including digital data by inserting the sequence of the vectors into the data. Related methods, systems and apparatus are also described. | 2015-02-05 |
20150040249 | Non-Human Animal Models of Depression and Methods of Use Thereof - The disclosure provides non-human optogenetic animal models of depression. Specifically, non-human animals each expresses a light-responsive opsin in a neuron of the animal are provided. The animal models are useful for identifying agents and targets of therapeutic strategies for treatment of depression. Examples of using the non-human animals expressing light-responsive opsin including Halorhodopsin family of light-responsive chloride pumps and Channelrhodopsin family of light-responsive cation channel proteins are described. | 2015-02-05 |
20150040250 | Animal Models and Therapeutic Molecules - The invention discloses methods for the generation of chimaeric human-non-human antibodies and chimaeric antibody chains, antibodies and antibody chains so produced, and derivatives thereof including fully humanised antibodies; compositions comprising said antibodies, antibody chains and derivatives, as well as cells, non-human mammals and vectors, suitable for use in said methods. | 2015-02-05 |
20150040251 | SHEEP NEMATODE VACCINE - The present invention is based upon the identification of a number of antigens derived from species of the genus | 2015-02-05 |
20150040252 | NOVEL BETA-ACTIN AND RPS21 PROMOTERS AND USES THEREOF - The invention relates to isolation of novel β-actin and ribosomal protein S21 (rpS21) promoters and uses thereof. In particular, this invention features nucleotide sequences for rodent β-actin promoters including, hamster, rat, and mouse, and hamster rpS21 promoter. | 2015-02-05 |
20150040253 | GENETICALLY MODIFIED MAJOR HISTOCOMPATIBILITY COMPLEX MICE - The invention provides genetically modified non-human animals that express a humanized MHC II protein (humanized MHC II α and β polypeptides), as well as embryos, cells, and tissues comprising the same. Also provided are constructs for making said genetically modified animals and methods of making the same. Methods of using the genetically modified animals to study various aspects of human immune system are provided. | 2015-02-05 |
20150040254 | Porcine CD28 receptor, gene for encoding same, and application of same - Provided is a porcine CD28 receptor molecule, which is: 1) a protein consisting of an amino acid sequence represented by SEQ ID NO:2, or 2) a protein derived from 1) by substitution, deletion or addition of one or several amino acids in the amino acid sequence represented by SEQ ID NO:2 and having equivalent activity with 1). Further provided is a gene for coding the porcine CD28 receptor, the nucleotide sequence of which is shown as SEQ ID NO:1. When the provided co-stimulating receptor CD28 is expressed specifically and highly in a T cell, the activation, proliferation and cell factor secretion activity of the T cell when stimulated by an antigen can be enhanced, thereby enhancing the acquired immune response of a host and enhancing the immune effect of a vaccine. | 2015-02-05 |
20150040255 | COTTON VARIETY 12R224B2R2 - The invention relates to the novel cotton variety designated 12R224B2R2. Provided by the invention are the seeds, plants, plant parts and derivatives of the cotton variety 12R224B2R2. Also provided by the invention are methods of using cotton variety 12R224B2R2 and products derived therefrom. Still further provided by the invention are methods for producing cotton plants by crossing the cotton variety 12R224B2R2 with itself or another cotton variety and plants and seeds produced by such methods. | 2015-02-05 |
20150040256 | COTTON VARIETY 12R249B2R2 - The invention relates to the novel cotton variety designated 12R249B2R2. Provided by the invention are the seeds, plants, plant parts and derivatives of the cotton variety 12R249B2R2. Also provided by the invention are methods of using cotton variety 12R249B2R2 and products derived therefrom. Still further provided by the invention are methods for producing cotton plants by crossing the cotton variety 12R249B2R2 with itself or another cotton variety and plants and seeds produced by such methods. | 2015-02-05 |
20150040257 | COTTON VARIETY 12R244R2 - The invention relates to the novel cotton variety designated 12R244R2. Provided by the invention are the seeds, plants, plant parts and derivatives of the cotton variety 12R244R2. Also provided by the invention are methods of using cotton variety 12R244R2 and products derived therefrom. Still further provided by the invention are methods for producing cotton plants by crossing the cotton variety 12R244R2 with itself or another cotton variety and plants and seeds produced by such methods. | 2015-02-05 |
20150040258 | COTTON VARIETY 13R315B2R2 - The invention relates to the novel cotton variety designated 13R315B2R2. Provided by the invention are the seeds, plants, plant parts and derivatives of the cotton variety 13R315B2R2. Also provided by the invention are methods of using cotton variety 13R315B2R2 and products derived therefrom. Still further provided by the invention are methods for producing cotton plants by crossing the cotton variety 13R315B2R2 with itself or another cotton variety and plants and seeds produced by such methods. | 2015-02-05 |
20150040259 | COTTON VARIETY 13R347B2R2 - The invention relates to the novel cotton variety designated 13R347B2R2. Provided by the invention are the seeds, plants, plant parts and derivatives of the cotton variety 13R347B2R2. Also provided by the invention are methods of using cotton variety 13R347B2R2 and products derived therefrom. Still further provided by the invention are methods for producing cotton plants by crossing the cotton variety 13R347B2R2 with itself or another cotton variety and plants and seeds produced by such methods. | 2015-02-05 |
20150040260 | COTTON VARIETY 13R352B2R2 - The invention relates to the novel cotton variety designated 13R352B2R2. Provided by the invention are the seeds, plants, plant parts and derivatives of the cotton variety 13R352B2R2. Also provided by the invention are methods of using cotton variety 13R352B2R2 and products derived therefrom. Still further provided by the invention are methods for producing cotton plants by crossing the cotton variety 13R352B2R2 with itself or another cotton variety and plants and seeds produced by such methods. | 2015-02-05 |
20150040261 | COTTON VARIETY 12R251B2R2 - The invention relates to the novel cotton variety designated 12R251B2R2. Provided by the invention are the seeds, plants, plant parts and derivatives of the cotton variety 12R251B2R2. Also provided by the invention are methods of using cotton variety 12R251B2R2 and products derived therefrom. Still further provided by the invention are methods for producing cotton plants by crossing the cotton variety 12R251B2R2 with itself or another cotton variety and plants and seeds produced by such methods. | 2015-02-05 |
20150040262 | WHEAT CULTIVAR TW419-052 AND COMPOSITIONS AND METHODS OF USING THE SAME - A wheat cultivar designated TW419-052 is disclosed. The invention relates to the seeds and plants of wheat cultivar TW419-052, and to methods for producing wheat seeds and plants by crossing wheat cultivar TW419-052 with itself or another wheat cultivar or wheat plant not designated a cultivar. The invention also relates to methods for producing seeds and plants of wheat cultivar TW419-052 containing in its genetic material one or more transgenes and to the transgenic wheat plants and plant parts produced by those methods. The invention also relates to methods for producing seeds and plants by mutagenesis of wheat cultivar TW419-052. The invention also relates to hybrid wheat seeds and plants produced by crossing wheat cultivar TW419-052 with another wheat cultivar. | 2015-02-05 |
20150040263 | WHEAT CULTIVAR TW412-011 AND COMPOSITIONS AND METHODS OF USINGTHE SAME - A wheat cultivar designated TW412-011 is disclosed. The invention relates to the seeds and plants of wheat cultivar TW412-011, and to methods for producing wheat seeds and plants by crossing wheat cultivar TW412-011 with itself or another wheat cultivar or wheat plant not designated a cultivar. The invention also relates to methods for producing seeds and plants of wheat cultivar TW412-011 containing in its genetic material one or more transgenes and to the transgenic wheat plants and plant parts produced by those methods. The invention also relates to methods for producing seeds and plants by mutagenesis of wheat cultivar TW412-011. The invention also relates to hybrid wheat seeds and plants produced by crossing wheat cultivar TW412-011 with another wheat cultivar. | 2015-02-05 |
20150040264 | TOMATO PLANTS COMPRISING TRANSGENIC EVENT BS2-X5 - The invention provides seed and plants of tomato comprising transgenic event Bs2-X5 and progeny thereof comprising this transgenic event and uses of such seeds and plants in the production of tomato fruit. The invention thus relates to non-hybrid and hybrid plants, seeds, and tissue cultures of tomato comprising transgenic event Bs2-X5, and to methods for producing a tomato plant produced by crossing such plants with themselves or with another tomato plant, such as a plant of another genotype. The invention further relates to seeds and plants produced by such crossing. The invention further relates to parts of such plants, including the fruit and gametes of such plants. | 2015-02-05 |
20150040265 | TRIPLOID WATERMELON PLANTS WITH A BUSH GROWTH HABIT - The application relates to the field of plant breeding, in particular watermelon breeding. Provided are bush type, triploid watermelon plants (and seeds from which these plants can be grown) and seedless watermelon fruits produced by these plants. Also provided are bush type pollenizer plants and bush type tetraploid plants and methods for producing triploid hybrids having a bush growth type, as well as methods for producing seedless watermelon fruits of high quality. | 2015-02-05 |
20150040266 | USE OF NON-AGROBACTERIUM BACTERIAL SPECIES FOR PLANT TRANSFORMATION - The invention relates to methods for Rhizobia-mediated genetic transformation of plant cells, including soybean, canola, corn, and cotton cells. These include both VirD2-dependent and VirD2-independent methods. Bacterial species utilized include strains of | 2015-02-05 |
20150040267 | ENGINEERED LANDING PADS FOR GENE TARGETING IN PLANTS - A method for producing a transgenic plant includes providing a nucleic acid molecule comprising at least two regions of nucleic acid sequence that lack sequence homology with genomic DNA of the plant cell, and at least two zinc finger nuclease recognition sites, wherein the at least two regions of nucleic acid sequence that lack sequence homology with genomic DNA of the plant cell flank the at least two zinc finger nuclease recognition sites. A plant cell or tissue having the nucleic acid molecule stably integrated into the genome of the plant cell is transformed. A plant is regenerated from the plant cell. Transgenic plants are produced by the method. Seeds are produced by the transgenic plants. | 2015-02-05 |
20150040268 | METHODS AND COMPOSITIONS FOR THE DELIVERY OF NUCLEIC ACIDS TO SEEDS - The present invention relates to methods of seed treatment and introduction of nucleic acid particles into intact seeds. In particular, the methods are non-priming seed treatment protocols capable of delivering naked DNA plasmids into seeds, without the use of microorganism or any additional means, and which are not plant species limited. | 2015-02-05 |
20150040269 | NOVEL PLANT-DERIVED CIS-REGULATORY ELEMENTS FOR THE DEVELOPMENT OF PATHOGEN-RESPONSIVE CHIMERIC PROMOTORS - The invention relates to an isolated cis-regulatory element imparting pathogen inducibility or elicitor inducibility, which comprises a nucleic acid molecule, the nucleotide sequence of which corresponds to one of the core sequence motifs comprising a) vaaagtm, b) aaacca, c) scaaam, d) acrcg, e) sktgkact, f) mrtsack, g) ccaccaa, h) tcgtctcttc (SEQ ID NO: 35), i) wwkgwc or a core sequence motif complementary to a) to i). | 2015-02-05 |
20150040270 | METHODS AND COMPOSITIONS FOR EXPRESSION OF TRANSGENES IN PLANTS - Transgenic plants are provided comprising a plurality of transgenes comprised in a single locus. In certain aspects, 7 or more transgenes may be expressed from a first locus. Methods are provided for transformation of plant cells with a plurality of transgenes. Also provided are methods for expressing and enhancing the expression of one or more transgenes in a plant. | 2015-02-05 |
20150040271 | Polypeptides having cellulolytic enhancing activity and polynucleotides encoding same - The present invention relates to isolated polypeptides having cellulolytic enhancing activity and isolated polynucleotides encoding the polypeptides. The invention also relates to nucleic acid constructs, vectors, and host cells comprising the polynucleotides as well as methods of producing and using the polypeptides. | 2015-02-05 |
20150040272 | PLANTS WITH ENHANCED TOLERANCE TO MULTIPLE ABIOTIC STRESSES - The present disclosure describes genetically-modified plants having enhanced tolerance to multiple abiotic stressors, such as extreme temperatures (heat or cold) and/or drought. Abiotic stress tolerance is enhanced by ectopic expression of a heterologous glutaredoxin. Abiotic stress tolerance (particularly drought) is also enhanced by inhibited function, activity, or expression of an endogenous glutaredoxin. Methods of producing such genetically-modified plants are also disclosed. | 2015-02-05 |
20150040273 | COMPOUND MICROSCOPE - A compound microscope of an optical microscope and a scanning probe microscope includes a stage to support a sample substrate holding a sample, and a cantilever chip having a substrate, a cantilever supported by the substrate, and a probe provided at the free end of the cantilever. The compound microscope further includes a scanner to hold the cantilever chip so that the probe faces the sample substrate and so that the substrate is inclined with respect to the sample substrate and to three-dimensionally scan the cantilever chip with respect to the sample substrate, a displacement sensor to optically detect the displacement of the cantilever, and an illumination light source to apply illumination light for observation by the optical microscope to the sample through the space between the substrate and the sample substrate. | 2015-02-05 |
20150040274 | Prunus tree rootstock named 'Gi31817' - A new and distinct | 2015-02-05 |
20150040275 | Prunus tree rootstock named 'Gi14813' - A new and distinct | 2015-02-05 |
20150040276 | Grape plant named 'Hope' - Description and specifications of a new and distinct grapevine cultivar named ‘Hope’ which originated from a hand-pollinated cross of A-1562 (non-patented, non-released breeding genotype)×A-1704 (non-patented, non-released breeding genotype). This new grapevine cultivar can be distinguished by its very tight large clusters, fruity flavor, high yields, medium vigor, and healthy plant. | 2015-02-05 |
20150040277 | Grape plant named 'Gratitude' - Description and specifications of a new and distinct grapevine cultivar named ‘Gratitude’ which originated from a hand-pollinated cross of A-1925 (non-patented, non-released breeding genotype; female)×A-1581 (non-patented, non-released breeding genotype; male). This new grapevine cultivar can be distinguished by its seedless, green, crisp berries with neutral flavor and resists cracking from rainfall at maturity. The fruit grows in large tight clusters, the vines have medium vigor, and the plants are healthy. | 2015-02-05 |
20150040278 | Grape plant named 'Joy' - Description and specifications of a new and distinct grapevine cultivar which originated from a hand-pollinated cross of A-1919 (non-patented, non-released breeding genotype)×A-1908 (non-patented, non-released breeding genotype). This new grapevine cultivar can be distinguished by its seedless, blue berries of exceptionally fruity flavor, medium sized clusters, moderate to high yield, medium vigor, and healthy plant. | 2015-02-05 |
20150040279 | Grape plant named 'Faith' - Description and specifications of a new and distinct grapevine cultivar named ‘Faith’ which originated from a hand-pollinated cross of A-1962 (non-patented, non-released breeding genotype)×Jupiter (U.S. Plant Pat. No. 13,309) made in 1990. This new grapevine cultivar can be distinguished by its seedless, blue/black berries of with neutral and occasional slight fruity flavor, medium sized clusters, medium vigor, and healthy plant. | 2015-02-05 |