16th week of 2015 patent applcation highlights part 59 |
Patent application number | Title | Published |
20150106901 | INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING METHOD AND COMMUNICATION DEVICE - Provided is a state with which each user is able to use information processing service of each user. A router ( | 2015-04-16 |
20150106902 | GLOBAL SHARING NETWORK SYSTEM - A unifying and automated access and archiving method and system that permits unification, in one single login procedure, access to all networks and Web portals, and, at the same time, automatic downloading of relevant documents made available in the Web, i.e., by suppliers and Public Administration. The method and system allows creation of a home archive to store all documents, data and contents of interest, both captured from the sources at Web portals and from sharing actions with other users. Documents are organized and stored on the basis of predefined logical criteria so being stored and made available for prompt research and eventual sharing. | 2015-04-16 |
20150106903 | INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING METHOD, AND NON-TRANSITORY COMPUTER-READABLE MEDIUM - An information processing system comprises: a management unit that performs management by associating an electronic certificate for a first group with notification destination information regarding a user who belongs to a second group and has a role in managing to allow the service to be used by the user belonging to the first group; and a notification unit that, in response to a remaining period until an expiration date of the electronic certificate falling below a predetermined value, identifies the notification destination information regarding the user belonging to the second group associated with the electronic certificate from among notification destination information, and performs a notification to update the electronic certificate based on the identified notification destination information. | 2015-04-16 |
20150106904 | COMMUNICATION TERMINAL AND COMMUNICATION PROCESSING METHOD - A processor stores authentication information managed by a native environment of the communication terminal in a first storage region of the storage device. The processor stores authentication information of an application to be executed on a Web application execution environment of the communication terminal in a second storage region of the storage device. The processor performs a control to write the authentication information stored in the first storage region to the second storage region when authentication information used by the application is not stored in the second storage region and is stored in the first storage region. | 2015-04-16 |
20150106905 | LOGIN METHOD FOR CLIENT APPLICATION AND CORRESPONDING SERVER - The present disclosure provides a login method for a client application and a corresponding server. The method includes: sending an access token to a browser of a terminal and creating a corresponding relationship between the access token and user information of a user after the user has successfully logged into a web application via the browser of the terminal; receiving a relationship creating request from the browser and creating a corresponding relationship between device information of the terminal and the access token in accordance with the relationship creating request, wherein the relationship creating request includes the device information of the terminal and the access token; receiving a login request of a client application, the login request including the device information of the terminal that operates the client application; determining the access token corresponding to the device information of the terminal that operates the client application based on the created corresponding relationship between the device information and the access token; and determining the user information which corresponds to the access token based on the created corresponding relationship between the access token and the user information, and performing a login operation of the client application program based on the user information. The technical scheme of the present disclosure can achieve login without re-inputting information such as a user name and a password when a client application is to be logged in after a web application in a terminal has successfully been logged in. | 2015-04-16 |
20150106906 | METHOD AND APPARATUS FOR TRANSMITTING ADDITIONAL AUTHORIZATION DATA VIA GSSAPI - A system and method for using a GSSAPI security token to transport additional non-GSSAPI data that includes authorization data used by third-party software. The system includes a hook that intercepts a client process's interactions with the GSSAPI. When a client process requests a security context from the GSSAPI, the hook intercepts the security token the GSSAPI provides for the client process. The hook checks to see if there is additional authorization data to transport, adds the additional data to the security token, then gives the token to the client process. The client process sends the security token to the server process, which submits the token to the GSSAPI for evaluation. A hook on this computer intercepts the security token, removes additional data added earlier, gives the added authorization data to a version of the third-party authorization software, then passes the now-unaltered security token to the server process which uses the security token to finish establishing a security context with the client process. | 2015-04-16 |
20150106907 | METHOD AND SYSTEM FOR SECURE CO-BROWSING OF PATIENT RECORDS ON COMMUNICATION DEVICES - A method and system are provided for co-browsing of patient records on communication devices. The method includes setting up a communication session between a first communication device and one or more second communication devices, where the communication session is initiated by the first communication device. Further, the method includes accessing one or more patient records via a server, where the one or more patient records are accessed at the first communication device. The method further includes sending a reference of the one or more patient records to the one or more second communication devices, where the reference is sent from the first communication device. | 2015-04-16 |
20150106908 | TRUSTED INTERNET IDENTITY - A token or other storage device uses Internet identities to set file access attribute rights. Subsequently, requests to access a file can be controlled by confirming the Internet identity of the requestor by either validating the request with a known public key or retrieving the public key from an Internet identity provider. Files may be stored encrypted and may be re-encrypted with the public key associated with Internet identity making the request. | 2015-04-16 |
20150106909 | CONFIGURING AND MANAGING REMOTE SECURITY DEVICES - Techniques for configuring and managing remote security devices are disclosed. In some embodiments, configuring and managing remote security devices includes receiving a registration request for a remote security device at a device for configuring and managing a plurality of remote security devices; verifying the registration request to determine that the remote security device is an authorized remote security device for an external network; and sending a response identifying one or more security gateways to the remote security device, in which the remote security device is automatically configured to connect to each of the one or more security gateways using a distinct Layer 3 protocol tunnel (e.g., a virtual private network (VPN)). | 2015-04-16 |
20150106910 | METHOD AND APPARATUS FOR REDUCING UNWANTED TRAFFIC BETWEEN PEER NETWORKS - A method and apparatus for enabling peer networks to reduce the exchange of unwanted traffic are disclosed. For example, the method receives at least one of: a source Internet Protocol (IP) address or a source IP address prefix that has been identified as a source of the unwanted traffic, by an originating peer network from a terminating peer network. The method then blocks the unwanted traffic destined to the terminating peer network by the originating peer network. | 2015-04-16 |
20150106911 | PROVISIONING PROXY FOR PROVISIONING DATA ON HARDWARE RESOURCES - A processing device receives an unauthenticated provisioning request from a hardware resource. Responsive to determining that the hardware resource satisfies one or more provisioning criteria, the processing device forwards the provisioning request to a server residing behind a firewall, receives provisioning data from the server, removes sensitive information from the provisioning data to create modified provisioning data, and forwards the modified provisioning data to the hardware resource. | 2015-04-16 |
20150106912 | REMOTE MACHINE MONITORING SYSTEMS AND SERVICES - The present disclosure describes illustrative, non-limiting embodiments of systems, apparatuses, and methods that can be used to facilitate the remote monitoring and support for manufacturing machines. In one particular embodiment, the techniques may be realized as a method for remote monitoring comprising the steps of storing a measurement taken of an injection molding machine to a machine controller associated with that machine; receiving operation data for the injection molding machine including the stored measurement from the machine controller; and remotely displaying the received data including the stored measurement to a first user at a location distant from the machine. | 2015-04-16 |
20150106913 | Method, Apparatus, Host, and Network System for Processing Packet - A method, an apparatus, a host, and a network system for processing a packet. The method includes receiving, by a physical host through a virtual bridge in the physical host, a network packet sent by a source virtual machine in the physical host, where the network packet carries a source media access control (MAC) address and a target MAC address; obtaining, by the physical host according to the source MAC address and the target MAC address by querying correspondence between each virtual machine MAC address and a security domain, a security domain to which the source virtual machine corresponds and a security domain to which a target virtual machine corresponds; and controlling, by the physical host, the virtual bridge to discard the network packet, when the security domain to which the source virtual machine corresponds is different from a security domain corresponding to the virtual bridge. | 2015-04-16 |
20150106914 | REMOTE CONTROL SYSTEM, AND METHOD THEREOF - A remote control method includes: assigning network address for a terminal device when the terminal device connects to a terminal connection device; obtaining an identifier code of the terminal connection device or a client connection device when the terminal connection device or the client connection device connects to a remote control server; obtaining terminal device information including network addresses and names of the terminal devices connected to the terminal connection device; storing the terminal information into the remote control server associated with the identifier code of the terminal connection device; determining a client connection device with the same identifier code as the terminal connection device and producing a terminal device list when the user produces a control request via a control device; and controlling the control device to connect to a selected terminal device in response to an operation to select the terminal device on the terminal device list. | 2015-04-16 |
20150106915 | TRUST LEVEL ACTIVATION - An isolation execution environment provides an application with limited resources to execute an application. The application may require access to secured resources associated with a particular trust level that are outside of the isolation execution environment. A trust activation engine determines the trust level associated with a request for a resource and operates differently based on the trust level. A broker process may be used to execute components providing access to resources having a partial trust level in an execution environment that is separate from the isolation execution environment. | 2015-04-16 |
20150106916 | LEVERAGING A PERIPHERAL DEVICE TO EXECUTE A MACHINE INSTRUCTION - A method includes executing microcode in a processing unit of a processor to implement a machine instruction, wherein the microcode is to manipulate the processing unit to access a peripheral device on a public communication bus at a private address not visible to other devices on the public communication bus and not specified in the machine instruction. A processor includes a public communication bus, a peripheral device coupled to the public communication bus, and a processing unit. The processing unit is to execute microcode to implement a machine instruction. The microcode is to manipulate the processing unit to access a peripheral device on a public communication bus at a private address not visible to other devices on the public communication bus and not specified in the machine instruction. | 2015-04-16 |
20150106917 | METHOD AND APPARATUS FOR CREATING SWITCHABLE DESKTOPS WITH SEPARATE AUTHORIZATIONS - A system and method for creating switchable desktops each with its own authorization. The system provides a custom authentication and authorization data store that defines permission sets called roles, and lists which roles each user may assume. The system also provides a custom virtual desktop manager that creates new virtual desktops using the permissions defined by roles allowed for each user. When a user requests a new virtual desktop and role from the desktop manager, the manager requests new virtual desktop components from the operating system. The desktop manager intercepts a request by the operating system to the Local Security Authority module for permissions to grant the new virtual desktop. The manager substitutes the user's requested role permissions (if the user may assume the rule) for the permissions granted by the LSA module. The LSA module and operating system grant those role permissions to the user's activities in a newly created virtual desktop. | 2015-04-16 |
20150106918 | INFORMATION PROCESSING APPARATUS, CONTROL METHOD FOR INFORMATION PROCESSING APPARATUS, AND STORAGE MEDIUM - When user information to be registered for SNMP authentication is input, an information processing apparatus confirms whether or not user information for MFP authentication is already managed for a user to be registered who is indicated by the input user information. In the case where the user information for MFP authentication is not managed for the user to be registered, the information processing apparatus registers the input user information as user information for SNMP authentication. In the case where the user information for MFP authentication is managed for the user, the information processing apparatus registers information specific to SNMP authentication, i.e. information other than an authentication password, out of the input user information. | 2015-04-16 |
20150106919 | OPERATION METHOD FOR ELECTRONIC APPARATUS - An operation method for an electronic apparatus is provided. The method includes: providing a setting function interface to be displayed on a display unit; detecting a motion trajectory operated on the display unit by a user using an input unit; performing an association setting to associate the motion trajectory with an operation function; making an original executing manner for executing the operation function unenforceable; and executing the corresponding operation function accordingly when an operation matching the motion trajectory is detected. | 2015-04-16 |
20150106920 | SYSTEM WITH PHYSICAL DATA AUTHORIZATION - A system for enabling data syncing between a host device and an electronic device includes a first port configured to be coupled to a first electronic device, a second port configured to be coupled to the host device, and a data sync switch coupled to the first port and the second port. The data sync switch is switchable between a first state, in which data communication between the electronic device and the host device is enabled, and a second state, in which data communication between the electronic device and the host device is disabled. The system also includes an authorization device configured to couple to an authorizing physical object and generate an output signal. The data sync switch is in one of the first state and the second state based on the output signal from the authorization device. | 2015-04-16 |
20150106921 | MOBILE COMMUNICATOR NETWORK ROUTING DECISION SYSTEM AND METHOD - A mobile communicator network routing decision system communicating with each mobile communicator device of a plurality of mobile communicator devices, the plurality of mobile communicator devices communicating with a network via at least one computerized network gateway server, the system including security risk calculation functionality operable for calculating a calculated malware-associated risk associated with each mobile communicator device, and security risk responsive decision functionality, operating in response to the calculated malware-associated risk, for ascertaining whether to allow the communicating of each mobile communicator device with the network via the computerized network gateway server. | 2015-04-16 |
20150106922 | PARAMETER ADJUSTMENT FOR PATTERN DISCOVERY - Pattern discovery performed on event data may include selecting an initial set of parameters for the pattern discovery. The parameters may specify conditions for identifying a pattern in the event data. A pattern discovery run is executed on the event data based on the initial set of parameters, and a parameter may be adjusted based on the output of the pattern discovery run. | 2015-04-16 |
20150106923 | SECURITY METHODS AND SYSTEMS - A system/method for preventing a computer virus from accessing message addresses is described. The system comprises an interception component or client plug-in that communicates with a messaging client and a messaging server. The interception component alters messages from the server and destined for the client. The interception component replaces message addresses in incoming messages with a unique identifier. The interception component also alters messages from the client destined for the server. The interception component replaces a unique identifier with a message addresses. A system/method for preventing keyboard sniffer programs from intercepting input, a system for preventing a computer virus from activating a send confirmation of a messaging client and a method for altering displayed objects to show encrypted data in decrypted form are also described and claimed. A system/method for reducing the impact of keyboard sniffer programs by altering keyboard input. | 2015-04-16 |
20150106924 | ENTERPRISE-WIDE SECURITY SYSTEM FOR COMPUTER DEVICES - A system and method for securing data in mobile devices ( | 2015-04-16 |
20150106925 | SECURITY SYSTEM AND METHOD - A security system and method for the application at a self-service or financial terminal is disclosed. This system comprises at least: a peripheral device ( | 2015-04-16 |
20150106926 | USER BEHAVIORAL RISK ASSESSMENT - A predetermined particular behavioral profile is identified associated with at least one particular user of a computing system, the particular behavioral profile identifying expected behavior of the at least one user within the computing system. Activities associated with use of the computing system by the particular user are identified and it is determined whether the identified activities correlate with the particular behavioral profile. Identifying an activity that deviates from the particular behavioral profile beyond a particular threshold triggers a risk event relating to the particular user. | 2015-04-16 |
20150106927 | REAL-TIME DETECTION AND CLASSIFICATION OF ANOMALOUS EVENTS IN STREAMING DATA - A system is described for receiving a stream of events and scoring the events based on anomalousness and maliciousness (or other classification). The events can be displayed to a user in user-defined groupings in an animated fashion. The system can include a plurality of anomaly detectors that together implement an algorithm to identify low probability events and detect atypical traffic patterns. The atypical traffic patterns can then be classified as being of interest or not. In one particular example, in a network environment, the classification can be whether the network traffic is malicious or not. | 2015-04-16 |
20150106928 | SCREENING OF EMAIL TEMPLATES IN CAMPAIGN MANAGEMENT - Various embodiments of systems and methods for uploading email templates in campaign management are described herein. In an aspect, the method includes screening an email template prior to uploading the email template to a campaign management application. The criteria for screening includes, but is not limited to, scanning for malware, checking for conformance with code page, and checking for conformance of placeholders with pre-defined format or syntax. Upon detecting an error an error message is notified to a user otherwise the email template is uploaded to the campaign management application for executing an email campaign. | 2015-04-16 |
20150106929 | SYSTEM AND METHOD FOR ATTACK AND MALWARE PREVENTION - A system and method for preventing malware attacks on mobile devices is presented. A server receives data from a mobile communications device and applies, by a known good component, logic on the data to determine if the data is safe. When the data is determined as being safe, the data is allowed to be processed by the mobile communications device. When the data is determined as not safe, a known bad component applies logic on the data to determine if the data is malicious. The data is rejected from being processed by the mobile communications device when the data is determined as being malicious. When the data is not malicious, a decision component performs an analysis on the data. If decision component determines the data to be safe, the data is allowed to be processed by the mobile communications device. Otherwise, the data is rejected from being processed. | 2015-04-16 |
20150106930 | LOG ANALYSIS DEVICE AND METHOD - A log analysis device that classifies, based on a log collected from a network device, a plurality of attack target communication devices receiving attacks from an attack source communication device includes a correlation coefficient calculation unit that calculates, based on the log, a correlation coefficient relating to the number of the attacks in a time period during which the attacks were carried out for a combination of the plurality of attack target communication devices, the time period including a detection time at which and the detection period of time during which the network device detected the attack, and an extraction unit that extracts, as a high-correlation communication device group, a combination of the plurality of attack target communication devices, for which the correlation coefficient is equal to or greater than a prescribed threshold and of which the attack source communication device is identical in the time period. | 2015-04-16 |
20150106931 | CLASSIFYING MALWARE BY ORDER OF NETWORK BEHAVIOR ARTIFACTS - The present invention generally relates to systems and methods for classifying executable files as likely malware or likely benign. The techniques utilize temporally-ordered network behavioral artifacts together with machine learning techniques to perform the classification. Because they rely on network behavioral artifacts, the disclosed techniques may be applied to executable files with obfuscated code. | 2015-04-16 |
20150106932 | METHOD AND SYSTEM FOR COMBINING FIBER OPTIC LINK HIERARCHICAL STREAM METADATA WITH INTERNET PROTOCOL METADATA - Physical Layer and Data-Link Layer data are connected with Networking through Application Layer data/information to enable searching, sorting, and identification of novel relationships between signal sources and their contents. Metadata can be used at the Physical Layer in an optical fiber network, connecting with metadata generated at the Data Link Layer, connected to metadata generated at the Network to Application Layer. The Physical Layer metadata is obtained from configuration and provisioning data within an Intelligent Optical System. The Data-Link Layer metadata is obtained from a signal processing device. The Network through Application Metadata is obtained from a packet capture or flow capture probe. The metadata from all layers are linked in a data store such that the network traffic, passing through stream(s) in optical fiber(s) layer data are combined. The effect of that combination enables security, intelligence, surveillance, or network analysts to separate application and network information by original source. | 2015-04-16 |
20150106933 | DEVICE FOR DETECTING CYBER ATTACK BASED ON EVENT ANALYSIS AND METHOD THEREOF - There are provided a device for detecting a cyber attack and a method thereof. The device for detecting a cyber attack includes an event receiving unit configured to receive an event generated in at least one user terminal according to a behavior of a user who accesses a web server and uses web services provided from a web page, a model generating unit configured to generate an event model by extracting an event pattern corresponding to a behavior of the user based on the received event, and an attack detecting unit configured to detect whether access of the web server by a specific user terminal is an attack by comparing the event model with an event received from the specific user terminal. Therefore, various forms of cyber attacks are rapidly and accurately detected, and it is possible to provide a security service having high availability and reliability. | 2015-04-16 |
20150106934 | POWER GRID UNIVERSAL DETECTION AND COUNTERMEASURE OVERLAY INTELLIGENCE ULTRA LATENCY HYPERVISOR - Any system with an interface may be attacked by a bad actor. If that interface is exposed to a network, the bad actor may launch a remote attack or cause other systems to attack the system. Many attacks exploit vulnerabilities that are unknown to the system operators (e.g., zero-day attacks). Power grid components, such as electricity meters, are increasingly networked and, therefore, increasingly attacked. By determining a pattern of behavior for a meter and then looking for a variation of the pattern, an attack may be identified. Once an attack is discovered, countermeasures may be launched to restore the system to normal operations, harden the system against future attack, and/or retaliate against the attacker. | 2015-04-16 |
20150106935 | DETECTING MALICIOUS NETWORK SOFTWARE AGENTS - This disclosure describes techniques for determining whether a network session originates from an automated software agent. In one example, a network device, such as a router, includes a network interface to receive packets of a network session, a bot detection module to calculate a plurality of scores for network session data based on a plurality of metrics, wherein each of the metrics corresponds to a characteristic of a network session originated by an automated software agent, to produce an aggregate score from an aggregate of the plurality of scores, and to determine that the network session is originated by an automated software agent when the aggregate score exceeds a threshold, and an attack detection module to perform a programmed response when the network session is determined to be originated by an automated software agent. Each score represents a likelihood that the network session is originated by an automated software agent. | 2015-04-16 |
20150106936 | MANAGING INFECTIOUS FORWARDED MESSAGES - Systems and methods for managing forwarded infectious messages are provided. Managing electronic message comprises receiving a message, forwarding the message, determining that the forwarded message is infectious after the message has been forwarded and preventing the infectious forwarded message from spreading. | 2015-04-16 |
20150106937 | Multi-Network Virus Immunization - An apparatus, device, methods, computer program product, and system are described that determine a virus associated with a communications network, and distribute an anti-viral agent onto the communications network using a bypass network, the bypass network configured to provide transmission of the anti-viral agent with at least one of a higher transmission speed, a higher transmission reliability, a higher transmission security, and/or a physically-separate transmission path, relative to transmission of the virus on the communications network. | 2015-04-16 |
20150106938 | EMAIL DELIVERY SYSTEM USING METADATA ON EMAILS TO MANAGE VIRTUAL STORAGE - E-mail system which organizes e-mails into queues based on their locations and characterizes the e-mails. Metadata, indicative of the e-mail, is appended to the e-mail. The queues are organized based on the metadata, and processed. The metadata is always stored in local storage; and the message body may be stored in local storage, or in remote storage, depending on how long it will be until the message is sent. A special server manages whether the information is stored in local or remote storage. | 2015-04-16 |
20150106939 | METHOD AND SYSTEM FOR DYNAMIC AND COMPREHENSIVE VULNERABILITY MANAGEMENT - One or more relevant scanners used to identify asset vulnerabilities are identified, obtained, and logically arranged for deployment on an asset in accordance with a vulnerability management policy and a scanner deployment policy such that the relevant scanners are deployed at, or before, a determined ideal time to minimize the resources necessary to correct the vulnerabilities, if found. The relevant scanners are then automatically deployed in accordance with the scanner deployment policy and, if a vulnerability is identified, one or more associated remedies or remedy procedures are applied to the asset. At least one of the one or more relevant scanners are then re-deployed on the asset to determine if the identified vulnerability has been corrected and, if the vulnerability is not corrected at, or before, a defined time, protective measures are automatically taken. | 2015-04-16 |
20150106940 | MOBILE DEVICE APPLICATION INTERACTION REPUTATION RISK ASSESSMENT - A computer processor receives rules associated with applications installed on a mobile device, and collects declared intents of the applications prior to execution of the applications. The computer processor generates possible combinations of declared intents of the applications and collects, by an intent proxy during execution, information associated with intercepted intents. The computer processor compares the information associated with each of the intercepted intents to the rules, wherein a match results in a first violation. The computer processor compares the intercepted intents to the possible combinations of the declared intents, wherein the intercepted intents other than the possible combinations of the declared intents results in a second violation. The computer processor displays a risk alert for the applications associated with either or both of the first violation and the second violation. | 2015-04-16 |
20150106941 | Computer-Implemented Security Evaluation Methods, Security Evaluation Systems, and Articles of Manufacture - Computer-implemented security evaluation methods, security evaluation systems, and articles of manufacture are described. According to one aspect, a computer-implemented security evaluation method includes accessing information regarding a physical architecture and a cyber architecture of a facility, building a model of the facility comprising a plurality of physical areas of the physical architecture, a plurality of cyber areas of the cyber architecture, and a plurality of pathways between the physical areas and the cyber areas, identifying a target within the facility, executing the model a plurality of times to simulate a plurality of attacks against the target by an adversary traversing at least one of the areas in the physical domain and at least one of the areas in the cyber domain, and using results of the executing, providing information regarding a security risk of the facility with respect to the target. | 2015-04-16 |
20150106942 | MOBILE DEVICE APPLICATION INTERACTION REPUTATION RISK ASSESSMENT - A computer processor receives rules associated with applications installed on a mobile device, and collects declared intents of the applications prior to execution of the applications. The computer processor generates possible combinations of declared intents of the applications and collects, by an intent proxy during execution, information associated with intercepted intents. The computer processor compares the information associated with each of the intercepted intents to the rules, wherein a match results in a first violation. The computer processor compares the intercepted intents to the possible combinations of the declared intents, wherein the intercepted intents other than the possible combinations of the declared intents results in a second violation. The computer processor displays a risk alert for the applications associated with either or both of the first violation and the second violation. | 2015-04-16 |
20150106943 | SECURITY TESTING OF WEB APPLICATIONS WITH SPECIALIZED PAYLOADS - In one embodiment, a computer-implemented method for security testing of web applications with specialized payloads includes submitting a test to a web application, where the test includes a payload with a set of constraints. A response is received from the web application. One or more constraints are derived from the response. The set of constraints of the payload are updated with the derived one or more constraints. The payload is synthesized, by a computer processor, for the updated set of constraints. The test having the synthesized payload is iterated with the updated set of constraints. | 2015-04-16 |
20150106944 | METHOD AND DEVICE FOR RISK EVALUATION - A risk evaluation method and a risk evaluation device for evaluating an anonymous dataset generated according to an original dataset are provided. The risk evaluation method comprises the following steps. Acquiring a plurality of appearing times respectively corresponding to a plurality of original values of the original dataset. Generating a partition set and a weight table according to a sample parameter, an anonymous parameter and the appearing times. Dividing the original dataset into a plurality of data partitions according to the partition set, and generating a penetration dataset according to the weight table and the data partitions, wherein the penetration dataset comprises a plurality of sample data. Comparing each sample data with a plurality of anonymous data of the anonymous dataset to obtain a plurality of matching quantities respectively corresponding to the sample data. And calculating and outputting a risk evaluation result according to the matching quantities. | 2015-04-16 |
20150106945 | METHOD, DEVICE AND APPARATUS FOR ACQUIRING SECURITY STATE OF MOBILE TERMINAL - Disclosed are a method, device and apparatus for acquiring the security state of a mobile terminal, which belong to the field of computers. The method includes: acquiring state information about key indicators preset by a mobile terminal; conducting a security level assessment on each key indicator through assessment policies corresponding to each of the preset key indicators, according to the state information about the key indicators, to obtain a first assessment result; and endowing each key indicator with a specific weight value, conducting an overall level assessment on the overall security state of the mobile terminal, and according to the weight value of each of the key indicators and the first assessment result of each of the key indicators, to obtain a second assessment result expressing the overall security state of the mobile terminal. The device includes: an acquiring module, a first assessment module and a second assessment module. | 2015-04-16 |
20150106946 | SECURE CLIENT DRIVE MAPPING AND FILE STORAGE SYSTEM FOR MOBILE DEVICE MANAGEMENT TYPE SECURITY - Methods and systems for providing a secure client drive mapping and/or file storage for mobile device management type security may include executing a managed application for presentation on a mobile device, receiving a request to save a data file locally on the mobile device, and determining whether the data file contains sensitive data are described herein. Subsequently, when the data file contains sensitive data and responsive to the request, the methods and system may also include encrypting the data file, storing the encrypted data file on the mobile device, and linking the encrypted data file to an unencrypted version of the data file, the unencrypted version of the data file not containing the sensitive data. | 2015-04-16 |
20150106947 | METHODS, SYSTEMS, AND DEVICES FOR HANDLING IMAGE DATA FROM CAPTURED IMAGES - Computationally implemented methods and systems include acquiring image data that includes an image that contains a representation of a feature of an entity and that has been encrypted through use of a unique device code, wherein said image data further includes a privacy metadata regarding a presence of a privacy beacon associated with the entity, obtaining term data at least partly based on the acquired privacy metadata, wherein said term data corresponds to one or more terms of service that are associated with use of the image that contains the representation of the feature of the entity, and generating a valuation of the image, said valuation at least partly based on one or more of the privacy metadata and the representation of the feature of the entity in the image. In addition to the foregoing, other aspects are described in the claims, drawings, and text. | 2015-04-16 |
20150106948 | METHODS, SYSTEMS, AND DEVICES FOR MONITORING PRIVACY BEACONS RELATED TO ENTITIES DEPICTED IN IMAGES - Computationally implemented methods and systems include monitoring a deployment of a privacy beacon associated with an entity, said privacy beacon configured to facilitate acquisition of one or more terms of service associated with said entity, and storing a record of the deployment of the privacy beacon associated with the entity, wherein said record is configured to be transmitted upon a particular request from a requestor entity. In addition to the foregoing, other aspects are described in the claims, drawings, and text. | 2015-04-16 |
20150106949 | DEVICES, METHODS, AND SYSTEMS FOR MANAGING REPRESENTATIONS OF ENTITIES THROUGH USE OF PRIVACY INDICATORS - Computationally implemented methods and systems include acquiring a block of encrypted data that corresponds to an image that has been encrypted through use of a unique device code associated with an image capture device configured to capture the image that includes a representation of a feature of an entity, obtaining a privacy metadata that corresponds to a detection of a privacy beacon in the image, said at least one image captured by the image capture device, said privacy beacon associated with the entity, and determining, at least partly based on the obtained privacy metadata, and partly based on a calculation related to the block of encrypted data that corresponds to the whether to allow one or more processes related to the encrypted data block. In addition to the foregoing, other aspects are described in the claims, drawings, and text. | 2015-04-16 |
20150106950 | METHODS, SYSTEMS, AND DEVICES FOR HANDLING IMAGE CAPTURE DEVICES AND CAPTURED IMAGES - Computationally implemented methods and systems include acquiring an encrypted image that is a captured image that has been encrypted through use of a particular device code associated with an image capture device that captured the captured image, wherein the captured image includes a representation of a feature of an entity, decrypting the acquired encrypted image that was encrypted through use of the particular device code, and performing a validation detection operation to detect a privacy beacon associated with the entity in the decrypted captured image. In addition to the foregoing, other aspects are described in the claims, drawings, and text. | 2015-04-16 |
20150106951 | Obscuring Internet Tendencies - Disclosed herein are techniques for obscuring Internet tendencies. It is determined whether a user tends to access a category of information over the Internet more than an average user. If the user accesses the category of information over the Internet more than the average user, a user profile associated with the user is adjusted such that the user profile is proportional to an average user profile associated with the average user. | 2015-04-16 |
20150106952 | PROVIDING ISOLATED ENTROPY ELEMENTS - Embodiments of the invention relate to providing isolated entropy elements for a virtual machine to increase entropy in a computing environment. At least one virtual machine is deployed on a hypervisor. The hypervisor generates entropy elements based on triggers related to a virtual machine. Identifiers are assigned to the entropy elements based on the triggers and the virtual machine. Use of the entropy elements is restricted for the virtual machine based on the assigned identifiers. The increase in entropy through providing isolated entropy elements for a virtual machine deployed on a hypervisor reduces the success of external attacks on data residing within the computing environment. | 2015-04-16 |
20150106953 | LINEAR NETWORK CODING IN A DYNAMIC DISTRIBUTED FEDERATED DATABASE - A method, system and/or computer program product secures response data sent from a responder to a querier. Path information for query data is collected. The path information identifies paths from the querier to the responder and includes a physical machine identifier for each node hosted by a physical machine. One or more sets of return paths are identified for sending response data. For each set of return paths, any return paths that utilize any nodes sharing a physical machine identifier with any node present in another of the return paths within the set of return paths are discarded. The response data is split into a plurality of portions, and each of the plurality of portions is sent from the responder to the querier using a different return path selected from one of the set of return paths | 2015-04-16 |
20150106954 | CONTENT TRANSMISSION DEVICE AND CONTENT RECEPTION DEVICE - A content reception equipment for accessing an in-home content transmission equipment from a remote place executes a first authentication process with the content transmission equipment in advance, executes the remote access information sharing process required for access from a remote place, and causes the information on the content reception equipment and the remote access information to be registered in an equipment information table of the content transmission equipment. | 2015-04-16 |
20150106955 | Methods, Devices, and Computer Readable Storage for Sharing Sensitive Content Securely - Sensitive content is securely shared. A request is received from a first communication device to share sensitive content. The first communication device is associated with an account for a communication service provided by a network provider. A message including a link to the sensitive content is sent to a second communication device associated with a phone number. That message is addressed to the second communication device. An authentication message is received, indicating that the second communication device is associated with the phone number. Responsive to receipt of the authentication message, the sensitive content is made accessible via the second communication device without requiring that the second communication device be associated with an account for the communication service provided by the network provider. | 2015-04-16 |
20150106956 | SYSTEMS AND METHODS FOR DYNAMIC ACCESS TO PROGRAM FEATURES - The multimedia client-server system provides a multimedia client program with a set of features and a server system that creates feature access information that determines which features are to be made available to a particular user. The server system may send the feature access information to the user such that the information is accessible to the multimedia client program. The multimedia client program may dynamically control the user's access to the program's feature set by using the feature access information to validate and verify the user. In addition, the feature access information may be accessible to the server system, such that the server system may periodically update the feature access information, such as, for example, when the user accesses the server system to download multimedia content. | 2015-04-16 |
20150106957 | METHODS, SYSTEMS, AND DEVICES FOR FACILITATING VIABLE DISTRIBUTION OF DATA COLLECTED BY WEARABLE COMPUTATION - A method substantially as shown and described the detailed description and/or drawings and/or elsewhere herein. A device substantially as shown and described the detailed description and/or drawings and/or elsewhere herein. | 2015-04-16 |
20150106958 | METHODS, SYSTEMS, AND DEVICES FOR MONITORING PRIVACY BEACONS RELATED TO ENTITIES DEPICTED IN IMAGES - Computationally implemented methods and systems include monitoring a deployment of a privacy beacon associated with an entity, said privacy beacon configured to facilitate acquisition of one or more terms of service associated with said entity, and storing a record of the deployment of the privacy beacon associated with the entity, wherein said record is configured to be transmitted upon a particular request from a requestor entity. In addition to the foregoing, other aspects are described in the claims, drawings, and text. | 2015-04-16 |
20150106959 | Porcine Animals Lacking Any Expression of Functional Alpha 1,3 Galactosyltransferase - The present invention is a porcine animal, tissue, organ, cells and cell lines, which lack any expression of functional alpha 1,3 galactosyltransferase (alpha1,3GT). These animals, tissues, organs and cells can be used in xenotransplantation and for other medical purposes. | 2015-04-16 |
20150106960 | METHOD FOR DIAGNOSING A SKELETAL CILIOPATHY - The present invention relates to a method for diagnosing a skeletal ciliopathy. | 2015-04-16 |
20150106961 | Humanized IL-15 Animals - Genetically modified non-human animals comprising a humanized interleukin-15 (IL-15) gene. Cells, embryos, and non-human animals comprising a human IL-15 gene. Rodents that express humanized or human IL-15 protein. | 2015-04-16 |
20150106962 | MINIATURE SWINE TRANSGENIC FOR ONE OR MORE COAGULATION FACTORS - Transgenic swine that express human coagulation factors, e.g., human coagulation factor VII, and/or one or more of human coagulation factors II, X and XII, and do not express the corresponding porcine coagulation factor or factors, as well as cells, tissues and organs derived therefrom, and their use in transplantation procedures. | 2015-04-16 |
20150106963 | CYB5 AND CYP17 MUTATIONS FOR ALTERATION OF 16-ANDROSTENE STEROID SYNTHESIS AND REDUCED BOAR TAINT IN PIGS - Novel mutations in cytochrome P450C17 (CYP17) and cytochrome b5 (CYB5) affecting 16-androstene steroid synthesis are disclosed. The novel mutations result in alterations in production of critical intermediaries in the synthesis of 16-androstene steroids. Altering the activity of these enzymes may be useful in enhancing reducing androstenone synthesis and reducing boar taint. The identification of these novel mutations also allows for the development of transgenic pigs bearing mutations in these enzymes or for genetic screening to identify pigs on the basis of their CYP17 and/or CYB5 genotype. Pigs having these mutations may be selected and bred to produce pigs that have a lower incidence of boar taint. | 2015-04-16 |
20150106964 | METHODS FOR PRODUCING ORGANISMS CAPABLE OF INGESTING AND DIGESTING OMEGA-3 RICH SOURCES IN GREATER VOLUME AND OMEGA-3 ENRICHED HYBRID ORGANISMS - The methods of producing an organism capable of ingesting and digesting omega-3 rich sources; for producing an organism that desires the consumption of omega-3 rich sources; and for producing an omega-3 enriched hybrid organism are each described. Each method isolates a donor DNA/RNA strand of a donor organism; extracts the donor DNA/RNA strand from the donor organism; and fuses the donor DNA/RNA strand into a receiving DNA/RNA strand of a receiving organism. In the first method, the donor organism is capable of ingesting and digesting omega-3 rich sources, and the receiving organism is incapable of ingesting or digesting omega-3 rich sources. In the second method, the donor organism desires the consumption of omega-3 rich sources, and the receiving organism does not desire the consumption of omega-3 rich sources. In the third method, the donor organism produces omega-3 fatty acids, and the receiving organism is unable to produce omega-3 fatty acids. | 2015-04-16 |
20150106965 | PEPPER HYBRID SV3255PB - The invention provides seed and plants of pepper hybrid SV3255PB and the parent lines thereof. The invention thus relates to the plants, seeds and tissue cultures of pepper hybrid SV3255PB and the parent lines thereof, and to methods for producing a pepper plant produced by crossing such plants with themselves or with another pepper plant, such as a plant of another genotype. The invention further relates to seeds and plants produced by such crossing. The invention further relates to parts of such plants, including the fruit and gametes of such plants. | 2015-04-16 |
20150106966 | TOMATO HYBRID PS01819578 - The invention provides seed and plants of tomato hybrid PS01819578 and the parent lines thereof. The invention thus relates to the plants, seeds and tissue cultures of tomato hybrid PS01819578 and the parent lines thereof, and to methods for producing a tomato plant produced by crossing such plants with themselves or with another tomato plant, such as a plant of another genotype. The invention further relates to seeds and plants produced by such crossing. The invention further relates to parts of such plants, including the fruit and gametes of such plants. | 2015-04-16 |
20150106967 | WOODY PLANTS HAVING IMPROVED GROWTH CHARACTERISTICS AND METHOD FOR MAKING THE SAME USING TRANSCRIPTION FACTORS - An extensive analytical platform for selecting genes with a possible commercial phenotype from a large group of candidate genes identified using tools in bioinformatics, data from EST sequencing and DNA array is disclosed. Methods are disclosed for producing a transgenic plant having an increased growth compared to its wild type by altering in the plant the level of a gene product of at least one gene specifically expressed during different phases of wood formation. This may be done with transgenic methods or by specific crossing methods. Plant cells or plant progeny and wood having modulated gene expression are also disclosed. A DNA construct with a nucleotide sequence for a gene producing a transgenic plant having an increased growth compared to its wild type and a plant cell or plant progeny having the DNA construct are also disclosed. | 2015-04-16 |
20150106968 | BEGONIA HYBRID 1600-05T1 - A hybrid begonia, designated 1600-05T1, is disclosed. The invention relates to the seeds of hybrid begonia 1600-05T1, to the plants of hybrid begonia 1600-05T1 and to methods for producing a begonia plant by crossing the cultivar 1600-05T1 with itself or another begonia. The invention further relates to methods for producing a begonia plant containing in its genetic material one or more transgenes and to the transgenic begonia plants and plant parts produced by those methods and to methods for producing other hybrid begonia derived from hybrid begonia 1600-05T1. | 2015-04-16 |
20150106969 | BEGONIA HYBRID 1600-08T1 - A hybrid begonia, designated 1600-08T1, is disclosed. The invention relates to the seeds of hybrid begonia 1600-08T1, to the plants of hybrid begonia 1600-08T1 and to methods for producing a begonia plant by crossing the cultivar 1600-08T1 with itself or another begonia. The invention further relates to methods for producing a begonia plant containing in its genetic material one or more transgenes and to the transgenic begonia plants and plant parts produced by those methods and to methods for producing other hybrid begonia derived from hybrid begonia 1600-08T1. | 2015-04-16 |
20150106970 | BREEDING METHOD FOR TWO LINES HYBRID RICE BASED ON THE RICE OSMS4 GENE MUTANT - Provided is a breeding method for two lines hybrid rice based on the rice mutant osms4 ( | 2015-04-16 |
20150106971 | THREONINE SYNTHASE FROM NICOTIANA TABACUM AND METHODS AND USES THEREOF - There is disclosed a mutant, non-naturally occurring or transgenic plant cell comprising: (i) a polynucleotide comprising, consisting or consisting essentially of a sequence encoding a threonine synthase and having at least 90% sequence identity to SEQ ID NO:1, SEQ ID NO:2 or SEQ ID NO:3 or at least 87% sequence identity to SEQ ID NO:4, or SEQ ID NO:5; (ii) a polypeptide encoded by any one of said polynucleotides set forth in (i); or (iii) a polypeptide having at least 95% sequence identity to SEQ ID NO:6, SEQ ID NO:7 or SEQ ID NO:8; or (iv) a construct, vector or expression vector comprising the polynucleotide as set forth in (i). | 2015-04-16 |
20150106972 | PLANT DEFENSE GENES AND PROTEINS AND METHODS OF USE - Methods and compositions for modulating development and defense responses are provided. Nucleotide sequences encoding plant defense proteins are provided. The sequences can be used in expression cassettes for modulating development, developmental pathways, and defense responses. Transformed plants, plant cells, tissues, and seed are also provided. | 2015-04-16 |
20150106973 | ISOLATED POLYNUCLEOTIDES AND POLYPEPTIDES AND METHODS OF USING SAME FOR INCREASING PLANT YIELD, BIOMASS, GROWTH RATE, VIGOR, OIL CONTENT, ABIOTIC STRESS TOLERANCE OF PLANTS AND NITROGEN USE EFFICIENCY - Provided are isolated polynucleotides comprising a nucleic acid sequence encoding a polypeptide at least 80% identical to SEQ ID NO: 422, 362-421, 423-601, 2429-4085 and 4086, such as a polynucleotide which is at least 80% identical to SEQ ID NO: 260, 1-259, 261-361, 602-2427 and 2428, nucleic acid constructs comprising same, plant cells comprising same, transgenic plants expressing same, and methods of generating thereof for increasing the yield, biomass, growth rate, vigor, oil content, fiber yield, fiber quality, nitrogen use efficiency and/or abiotic stress tolerance of a plant. | 2015-04-16 |
20150106974 | PLANTS HAVING ENHANCED YIELD-RELATED TRAITS AND A METHOD FOR MAKING THE SAME - The present invention concerns a method for enhancing yield-related traits in plants by modulating expression in a plant of one ore more nucleic acid(s) encoding at least two iSYT (interactor of SYT—synovial sarcoma translocation—) polypeptides. The present invention also concerns plants having modulated expression of a nucleic acid encoding at least two iSYT polypeptides, which plants have enhanced yield-related traits relative to corresponding wild type plants or other control plants. Nucleic acids encoding at least two iSYT polypeptides and constructs comprising the same useful in performing the methods of the invention are also disclosed. Also provided are constructs useful in the methods of the invention. The present invention also relates to an iSYT-based protein complex. The use of the complex to promote plant growth, and a method for stimulating the complex formation, by overexpressing at least two members of the complex, are also disclosed. | 2015-04-16 |
20150106975 | Molecular Markers Associated with Aphid Resistance in Soybean - The present invention provides methods and compositions for the identification and selection of loci modulating phenotypic expression of an aphid resistance trait in plant breeding. In addition, methods are provided for screening germplasm entries for the performance and expression of this trait. | 2015-04-16 |
20150106976 | PESTICIDAL PLANT EXTRACT CONTAINING LOLINE DERIVATIVES - This invention relates to a pesticidal compositions containing at least one pyrrolizidine alkaloid compound derived from a plant and endophyte combination, and applying the pesticidal compositions to another plan without pesticidal protection, where upon application of the composition, the plant confers pest protection. The pyrrolizidine alkaloid compound is of Formula (I) wherein: R═H or CH | 2015-04-16 |
20150106977 | ZEA MAYS REGULATORY ELEMENTS AND USES THEREOF - Provided are vector constructs and methods for expressing a transgene in plant cells and/or plant tissues using gene regulatory elements, including the promoters, 5′-UTRs, and/or 3′-UTRs, isolated from | 2015-04-16 |
20150106978 | ZEA MAYS REGULATORY ELEMENTS AND USES THEREOF - Provided are vector constructs and methods for expressing a transgene in plant cells and/or plant tissues using gene regulatory elements, including the promoters, 5′-UTRs, introns, and/or 3′-UTRs, isolated from | 2015-04-16 |
20150106979 | OPTICAL AND ATOMIC FORCE MICROSCOPY INTEGRATED SYSTEM FOR MULTI-PROBE SPECTROSCOPY MEASUREMENTS APPLIED IN A WIDE SPATIAL REGION WITH AN EXTENDED RANGE OF FORCE SENSITIVITY - An optical and atomic force microscopy measurement integrated system is described. The system has an atomic force microscope having a first probe configured to interact with a sample to be analysed, an optical tweezer, a second probe configured to be held in the focus of the optical tweezer, movement means for moving the two probes, measurement means for measuring the variations of position of the two probes and processing means configured to receive, as an input, the measurement signals of the two probes to generate an output signal representative of the sample. | 2015-04-16 |
20150106980 | Blueberry plant named 'FL98-325' - FL98-325 is a new and distinct southern highbush blueberry ( | 2015-04-16 |
20150106981 | Nectarine tree named 'Bowden' - Description and specification of a new and distinct nectarine tree cultivar named ‘Bowden’ which originated from a hand-pollinated cross of Ark. 699N×Ark. 663CN made in 2001. This new nectarine cultivar can be distinguished by its very firm, non-melting white flesh, early-mid season ripening, medium-sized fruits, excellent fruit quality with distinct white nectarine flavor, and resistance to bacterial spot disease. | 2015-04-16 |
20150106982 | Nectarine tree named 'Amoore Sweet' - Description and specification of a new and distinct nectarine tree cultivar named ‘Amoore Sweet’ which originated from a hand-pollinated cross of Ark. 699N×Ark. 663CN made in 2001. This new nectarine cultivar can be distinguished by its very firm, non-melting yellow flesh, early-mid season ripening, medium-sized fruits, excellent fruit quality with distinct low-acid nectarine flavor, and resistance to bacterial spot disease. | 2015-04-16 |
20150106983 | Peach tree named 'Souvenirs' - Description and specification of a new and distinct peach tree cultivar named ‘Souvenirs’ which originated from a hand-pollinated cross of Ark. 708 (non-patented)×Winblo (non-patented) made in 2001. This new peach cultivar can be distinguished by its very firm fruit with slow-melting yellow flesh, early-mid season ripening, medium size, attractive appearance, high red skin color, excellent fruit quality, good flavor, and resistance to bacterial spot disease. | 2015-04-16 |
20150106984 | Vitex plant named 'piivac-i' - A new and distinct cultivar of | 2015-04-16 |
20150106985 | Distylium plant named 'Piidist-IV' - A new and distinct cultivar of | 2015-04-16 |
20150106986 | Buddleia plant named 'PIIBD-II' - A new and distinct cultivar of | 2015-04-16 |
20150106987 | Buddleia plant name 'Piibd-I' - A new and distinct cultivar of | 2015-04-16 |
20150106988 | Phalaenopsis orchid plant named 'PHALCIQEQ' - A new and distinct variety of | 2015-04-16 |
20150106989 | Phalaenopsis orchid plant named 'PHALFIMWAQ' - A new and distinct variety of | 2015-04-16 |