18th week of 2015 patent applcation highlights part 79 |
Patent application number | Title | Published |
20150121500 | USING APPLICATION LEVEL AUTHENTICATION FOR NETWORK LOGIN - In general, in one aspect, embodiments relate to receiving, by a system comprising one or more network devices, a first client authentication information comprising a first indication that a first client device was successfully authenticated by a first authentication server based on credentials provided by the first client device, and forwarding, by the system, the first client authentication information to a second authentication server without determining that the client device was already successfully authenticated by the first authentication server based on the credentials provided by the first client device. The operations further include receiving, by the system from the second authentication server, a second indication that the first client device was successfully authenticated, and based on the second indication received by the system from the second authentication server, granting, by the system, network access to the first client device. | 2015-04-30 |
20150121501 | CONNECTED AUTHENTICATION DEVICE USING MOBILE SINGLE SIGN ON CREDENTIALS - Systems and methods for device-based authentication are disclosed. In some implementations, a device receives a Single Sign On PIN from a backend server. The device transmits, to a token server, the Single Sign On PIN and credentials of a subscriber identity module (SIM) to request a token for accessing a network resource via a computer different from the device. The token is associated with a user account. The device receives the token from the token server. The device stores the token at a local memory of the device. | 2015-04-30 |
20150121502 | Session Management Technique - A system for managing sessions between a client and multiple servers includes: a receiver for receiving, as a proxy for each of the servers, a request from the client to any of the servers; a determination unit for determining, upon receipt of the request from the client to any of the servers, whether sessions established between the client and the multiple servers are maintained; a disconnection unit for disconnecting, on condition that a session between the client and any of the multiple servers is already disconnected, the sessions established between the client and the servers different from the disconnected server; and a forward unit for forwarding, on condition that the sessions established between the client and all of the multiple servers are maintained, the received request to the destination server for the request. | 2015-04-30 |
20150121503 | METHOD, SYSTEM AND STORAGE MEDIUM FOR USER ACCOUNT TO MAINTAIN LOGIN STATE - Provided is a method for maintaining a login state of a user account, including: acquiring a data access request corresponding to a user ID, the data access request includes a session ID corresponding to the user ID; extracting the session ID from the data access request, and acquiring a session corresponding to the session ID; and allocating the session acquired to the data access request. Also provided are a system and a storage medium for a user account to maintain a login state. The aforementioned method, system and storage medium for a user account to maintain a login state can reduce resource overheads. | 2015-04-30 |
20150121504 | IDENTIFICATION PROCESS OF APPLICATION OF DATA STORAGE AND IDENTIFICATION HARDWARE WITH IC CARD - The present invention relates to an identification process of application of data storage and identification hardware with IC (Integrated Circuit) card, and particularly to an IC card and within identification ICCID and GLN, which can be installed in a USB compatible flash memory, as identification hardware device. This can be as a useful authorization process of records companies or intellectual property owners. The hardware can also be used as storage media. Use non-duplication code in IC card and encryption system to ensure user authentication and data confidentiality on Internet or any other information system of computer. As using normal private key the invention is easy and convenient to use. | 2015-04-30 |
20150121505 | WIRELESS SESSION CONFIGURATION PERSISTENCE - A wireless access point employs a wireless configuration database for retrieving a stored wireless profile corresponding to a subscriber device from a remote location that enables the user to establish an Internet connection using their subscriber device with the same network identifiers and settings employed from the home wireless profile. The network identifier is typically an SSID (Service Set Identification), and labels the wireless configuration using a mnemonic name familiar to the user. The wireless configuration also denotes authentication and security (passphrase) tokens required for access, and would therefore enable the user to sign on at the remote wireless access point using the passphrase already known from their home WiFi arrangement. Subsequent attempts automatically establishing a connection to the subscriber device upon detection and authentication using the retrieved wireless profile without broadcasting an open SSID receivable by other wireless devices within range. | 2015-04-30 |
20150121506 | METHODS OF DYNAMICALLY SECURING ELECTRONIC DEVICES AND OTHER COMMUNICATIONS THROUGH ENVIRONMENTAL AND SYSTEM MEASUREMENTS LEVERAGING TAILORED TRUSTWORTHY SPACES - This invention is for a system capable of securing one or more fixed or mobile computing device and connected system. Each device is configured to change its operating posture by allowing, limiting, or disallowing access to applications, application features, devices features, data, and other information based on the current Tailored Trustworthy Space (TTS) definitions and rules which provided for various situationally dependent scenarios. Multiple TTS may be defined for a given deployment, each of which specifies one or more sensors and algorithms for combining sensor data from the device, other connected devices, and/or other data sources from which the current TTS is identified. The device further achieves security by loading digital credentials through a unidirectional multidimensional physical representation process which allows for the device to obtain said credentials without the risk of compromising the credential issuing system through the data transfer process. This secure system methodology may be used to create a Mobile Secure Compartmentalized Information Facility (M-SCIF), among other applications. | 2015-04-30 |
20150121507 | Systems and methods to secure industrial sensors and actuators - Various embodiments of the invention provide for secure data communication in industrial process control architectures that employ a network of sensors and actuators. In various embodiments, data is secured by a secure serial transmission system that detects and authenticates IO-Link devices that are equipped with secure transceivers circuits, thereby, ensuring that non-trusted or non-qualified hardware is prevented from connecting to a network and potentially compromising system behavior. | 2015-04-30 |
20150121508 | METHOD, A COMPUTER PROGRAM AND APPARATUS FOR ANALYZING SYMBOLS IN A COMPUTER - The invention provides a computer-implemented method of analyzing symbols in a computer system, the symbols conforming to a specification for the symbols, in which the specification has been codified into a set of computer-readable rules; and, the symbols analyzed using the computer-readable rules to obtain patterns of the symbols by determining the path that is taken by the symbols through the rules that successfully terminates, and grouping the symbols according to said paths, the method comprising; upon receipt of a message at a computer, performing a lexical analysis of the message; and, in dependence on lexical analysis of the message assigning the message to one of the groups identified according to said paths. The invention also provides a computer programmed to perform the method and a computer program comprising program instructions for causing a computer to perform the method. | 2015-04-30 |
20150121509 | DISPLAY APPARATUS THAT DISPLAYS ONE-TIME PASSWORD - A display apparatus includes a display panel, a display condition setting unit that defines a specified display point in a specific screen as a display point of a one-time password for a specified user and sets a display condition for the one-time password, and a password display unit that displays, to the specified user, the one-time password at a display point included in the display condition based on the display condition set by the display condition setting unit when the specific screen is displayed in the display panel. | 2015-04-30 |
20150121510 | METHOD, DEVICE AND SYSTEM FOR ENTERING DATA - The invention relates to a method for entering data, data to be entered comprising at least one digit. A first device comprises at least one touch sensitive interface. The touch sensitive interface is sensitive to at least one touch. According to the invention, at least one digit being associated with no touch or a count of at least one touch, the method comprises the following steps. The first device detects, in a predetermined time period, a count of at least one touch that is or is not present at once or several times. The first or a second device determines the digit associated with no detected touch or a detected count of at least one touch, the second device being connected to the first device. The invention also relates to corresponding device and system. | 2015-04-30 |
20150121511 | SYSTEM AND METHOD FOR ELECTRONIC STAMPING - A system and method for electronic stamping are disclosed. Personal fingerprint pre-stored is used to verify the fingerprint information collected, the document data and the fingerprint information is signed with a private key to get a first signature result, the user's public key and the pre-stored fingerprint information is then signed with a private key of a stamp producer to get a second signature result, the first signature result, the collected fingerprint information and the second signature result are combined to form electronic fingerprint stamp data. | 2015-04-30 |
20150121512 | AUTHENTICATION APPARATUS AND METHODS - A method of and an apparatus for verifying authenticity of a target authentication device comprising a reference pattern having a characteristic frequency and a security pattern, the security pattern comprises an embedded security device that is coded with phase modulation information. The method comprises extracting frequency domain data from an image of the target authentication device to facilitate verification of authenticity of the target authentication device. The method provides a very effective end expedient mechanism for verifying authenticity of a moiré or moiré like authentication device to combat counterfeiting. | 2015-04-30 |
20150121513 | METHOD OF GENERATING AUTHENTICATION PATTERNS AND AUTHENTICATING SYSTEM EMPLOYING THE SAME - An authenticating system includes an authenticating device, a background display device, a sensing device, and an authentication pattern checking device. The authenticating device displays a first display pattern on a transparent display panel including a transmissivity pattern. The transmissivity pattern includes a plurality of regions with different transmissivities. The background display device displays a second display pattern on a display panel to overlap the transparent display panel. The sensing device generates a sensing pattern by sensing an authentication pattern generated based on the transmissivity pattern, the first display pattern, and the second display pattern. The authentication pattern checking device performs authentication by checking whether the sensing pattern is consistent with an authentication reference pattern. | 2015-04-30 |
20150121514 | METHOD FOR PERFORMING AUTHENTICATION USING BIOMETRICS INFORMATION AND PORTABLE ELECTRONIC DEVICE SUPPORTING THE SAME - A method for performing authentication in a portable electronic device is provided. The method includes identifying whether a peripheral electronic device is located within a certain distance from the portable electronic device, receiving biometrics information from the peripheral electronic device when the peripheral electronic device is located within the certain distance from the portable electronic device, identifying whether the biometrics information received from the peripheral electronic device is identical to biometrics information stored in the portable electronic device, and releasing security set to the portable electronic device when the biometrics information received from the peripheral electronic device is identical to the biometrics information stored in the portable electronic device. | 2015-04-30 |
20150121515 | Limiting User Operations - An information processing device having a lock function for restricting user operations and a mechanism executed by this information processing device are provided in which the information processing device includes: an input unit for receiving a first password and a specified location from a user; a mode setting unit for switching to a restricted mode restricting at least some of the functions of the information processing device in response to receiving the first password and location; and a releasing unit for releasing the restricted mode on condition that the information processing device has reached the specified location. | 2015-04-30 |
20150121516 | AUTHENTICATING INPUT IN TRUSTED EXECUTION MODE - Disclosed herein are a method and electronic device for enhancing security authentication. An execution mode may be changed from a non-trusted execution mode to a trusted execution mode. At least one input may be authenticated while in the non-trusted execution mode. | 2015-04-30 |
20150121517 | BUNDLE-TO-BUNDLE AUTHENTICATION IN MODULAR SYSTEMS - A bundle-to-bundle authentication process is presented that provides a flexible authentication mechanism to application bundles for accessing the persistence bundle of a modular application and requesting security sensitive data from a database. The modular application comprises a plurality of bundles such as application bundles, connector bundles, persistence bundles, authentication bundles, and so on. During runtime of the modular application, the application bundles and the connector bundles may need access to security protected resources (sensitive data) stored in the database. To access these resources, the application bundles and the connector bundles should authenticate themselves with the persistence bundle. The persistence bundle provides the communication with the database. | 2015-04-30 |
20150121518 | PRIVILEGED ANALYTICS SYSTEM - A computer-implemented method for determining whether a computer network is compromised by unauthorized activity on the computer network. The computer-implemented method comprises identifying a behavioral anomaly of an entity on the computer network, classifying the anomaly as a system event based on an assigned score for the anomaly being at least at a predetermined score threshold, updating an incident based on at least one common parameter between the system event and other system events which comprise the incident, each system event of the incident including an assigned score from when the event was an anomaly, updating a system status based on at least the incident, and assigning a system status score to the system status, and, determining whether the system status score is at least at a predetermined threshold system status score indicating that the computer network may be compromised. | 2015-04-30 |
20150121519 | SYSTEM AND METHOD FOR MONITORING AND CONTROLLING A PERFORMANCE STATE CHANGE - The present disclosure relates to a method and system for securing a performance state change of one or more processors. A disclosed method includes detecting a request to change a current performance state of a processor to a target performance state, and adjusting an operating level tolerance range of the current performance state to include operating levels associated with a transition from the current performance state to the target performance state. A disclosed system includes an operating system module operative to transmit a request for a performance state change of at least one processing core. The system includes performance state control logic operative to change the performance state of the at least one processing core based on the request. The system further includes performance state security logic operative to adjust, in response to the request, an operating level tolerance range of the current performance state to include operating levels associated with a transition from the current performance state to the target performance state. | 2015-04-30 |
20150121520 | SYSTEM AND METHOD FOR SECURITY PROCESSOR CONTROL OVER CPU POWER STATES - The present disclosure presents methods and apparatuses for controlling a power state, which may include a C-state, of one or more processing cores of a processor. In an aspect, an example method of securing a power state change of a processor is presented, the method including the steps of receiving a power state change request from the processor, the processor having a plurality of potential power states each including an operating power profile; determining a power state change request mode associated with the processor; forwarding the power state change request to a security processor where the power state change request mode is a one-time request mode; receiving a power state change request response from the security processor in response to the request; and adjusting the current power state of the processor to the target power state where the power state change request response comprises a power state change approval. | 2015-04-30 |
20150121521 | CONTENT SCREENING METHOD, APPARATUS AND SYSTEM - A content screening method, apparatus and system are provided for a content screening component to verify the trust relationship and the categorization standard used by a categorization component. A method includes the following steps: the content screening component receives a categorized content; and when determining that a first categorization component that categorizes the content is trustworthy according to the information of the categorization component carried in the categorized content, the content screening component screens the content by the content category carried in the categorized content. Another method includes the following step: when determining that the categorization component that categorizes the content uses the same categorization standard as the content screening component according to the information of the categorization component carried in the categorized content, the content screening component screens the content by the content category carried in the categorized content. | 2015-04-30 |
20150121522 | PERIODIC MOBILE FORENSICS - A forensics analysis is conducted on each of multiple mobile devices in an enterprise system to detect malicious activity. The systems and methods described include storing a single baseline image for the multiple mobile devices at a server. A client-side application on each mobile device scans storage locations to identify changes in data compared to a previous scan. At least a portion of the information about the changes is sent to the server. The server reconstructs snapshot images for each mobile device based on the baseline image and the received information. Malicious activity is detected by comparing the reconstructed snapshot image to a previous snapshot image for each mobile device. | 2015-04-30 |
20150121523 | SYSTEMS AND METHODS FOR FACILITATING REMOTE SECURITY THREAT DETECTION - Systems and methods are disclosed for detecting security threats in a network environment. A local workstation is used to inspect an item and submit a request for assistance to determine whether the item raises a security threat. A server receives the request for assistance from the local workstation over a network, selects a remote expert device that is available to receive the request and routes the request to the remote expert device. In response to the request being accepted at the remote expert device, the server may transmit information associated with the local workstation to the remote expert device and establish a connection between the local workstation and the remote expert device. The remote expert device utilizes attribute information pertaining to the local workstation or local operator to facilitate effective communications between the local workstation and remote expert device for determining whether the item raises a security threat. | 2015-04-30 |
20150121524 | Method and System for Performing Behavioral Analysis Operations in a Mobile Device based on Application State - Methods, systems and devices use operating system execution states while monitoring applications executing on a mobile device to perform comprehensive behavioral monitoring and analysis include configuring a mobile device to monitor an activity of a software application, generate a shadow feature value that identifies an operating system execution state of the software application during that activity, generate a behavior vector that associates the monitored activity with the shadow feature value, and determine whether the activity is malicious or benign based on the generated behavior vector, shadow feature value and/or operating system execution states. The mobile device may also be configured to intelligently determine whether the operating system execution state of a software application is relevant to determining whether any of the monitored mobile device behaviors are malicious or suspicious, and monitor only the operating system execution states of the software applications for which such determinations are relevant. | 2015-04-30 |
20150121525 | Filtering Network Traffic Using Protected Filtering Mechanisms - Concepts and technologies are disclosed herein for filtering network traffic using protected filtering mechanisms. An indication that traffic is to be filtered can be received, and a hash key, a signature representation, and an obfuscated signature can be identified or generated. The hash key and the signature representation can be provided to a first device without exposing the contents of the signature to the second device, and the obfuscated signature can be provided to a second device without exposing the contents of the signature to the second device. The first device and the second device can execute independent operations to collectively determine if the traffic is to be filtered. | 2015-04-30 |
20150121526 | METHODS AND SYSTEMS FOR MALWARE ANALYSIS - Methods, system, and media for analyzing a potential malware sample are disclosed. A sample for malware analysis may be received. The sample may be received through a web interface. The sample may be analyzed using a plurality of analyzers implemented on one or more computing devices. The analyzers may perform a sequence of configurable analytic steps to extract information about the sample. The extracted information may be displayed to a user through the web interface. | 2015-04-30 |
20150121527 | METHOD AND APPARATUS FOR DETECTING UNAUTHORIZED ACCESS POINT - There is provided a method and apparatus for detecting an unauthorized access point. The method for detecting an unauthorized access point according to an embodiment of the present disclosure includes making an attempt to deliver, through an access point to a validation server, a message that includes network information regarding a network access of a terminal device and requests a validity verification of the network information; and determining that the access point is unauthorized when a response indicating that the network information is valid is not received from the validation server. According to the embodiment of the present disclosure, it is possible to implement a device for determining an unauthorized access point device in a general manner, independent of a specific device. | 2015-04-30 |
20150121528 | SYSTEMS AND METHODS FOR FACILITATING REMOTE SECURITY THREAT DETECTION - Systems and methods are disclosed for detecting security threats in a network environment. A local workstation is used to inspect an item and submit a request for assistance to determine whether the item raises a security threat. A server receives the request for assistance from the local workstation over a network and retrieves a dialing plan associated with the origin of the request. The server utilizes the dialing plan to route the request to expert groups assigned to the dialing group. In response to the request being accepted by a remote expert device in one of the expert groups, the server establishes a connection between the local workstation and the remote expert device that accepted the request. | 2015-04-30 |
20150121529 | DYNAMIC SERVICE HANDLING USING A HONEYPOT - A network device comprises one or more processors coupled to a memory, and a dynamic services module configured for execution by the one or more processors to receive, from a client device, a service request specifying a service. The dynamic service module is further configured for execution by the one or more processors to, in response to obtaining a negative indication for the service, send a representation of the service request to a honeypot to cause the honeypot to offer the service to the client device. | 2015-04-30 |
20150121530 | System and Method for Sharing Files Between a Removable Device and a Target System - A method for sharing one or more files from a removable medium to a target computer includes sending a request for an application for converting the one or more files to a format compatible for use in the target computer; using the application, converting the files into the compatible format; emulating a file system, the emulated file system corresponding to the removable medium; storing the converted files in the emulated file system; and providing the target computer access to the converted files through the emulated file system. | 2015-04-30 |
20150121531 | SYSTEM AND METHOD FOR PRESERVING AND SUBSEQUENTLY RESTORING EMULATOR STATE - Disclosed are systems, methods, and computer program products for preserving and subsequently restoring a state of a program emulator. In one aspect, the system loads a file into an emulator of the computer system and determines whether an emulation is being performed for the first time. When the emulation is performed for the first time, the system loads into the emulator an initial image of the emulator state and emulates the file using the loaded initial image of the emulator state. During emulation, the system creates and stores new images of the emulator state upon occurrence of predefined conditions. When the emulation is not performed for the first time, the system identifies new images of the emulator state created during initial emulation of the file, loads into the emulator the identified images, and resume emulating the file using the new images of the emulator state. | 2015-04-30 |
20150121532 | SYSTEMS AND METHODS FOR DEFENDING AGAINST CYBER ATTACKS AT THE SOFTWARE LEVEL - A method for a customized, scalable and cost-efficient solution to enable source code level solutions to provide zero percentage false positives as well as a controlled false negative ratio to detect software security vulnerabilities accurately and in time. The method includes secure uploading of the source code, initial analysis and customizing according to accuracy and depth defined to enable control of the false negative ratio. The method also includes application processing, advanced analyzing, performing report development and delivering a secure report. The initial analysis provides for a human analyst “built-in” as part of the process that performs the analysis on initial results and the filtering of the results to contain ONLY relevant security vulnerabilities | 2015-04-30 |
20150121533 | DYNAMIC ANALYSIS INTERPRETER MODIFICATION FOR APPLICATION DATAFLOW - An interpreter is modified to create a source tracking object for a data object received from a data source and to record information associated with the data source into the source tracking object. The interpreter is modified to create a copy of the data object for a tracking event in an application program, to create a flow tracking object for the tracking event, and to record information associated with the tracking event into the flow tracking object as the tracking event processes the copy of the data object. The interpreter is modified to create a sink tracking object for outputting the copy of the data object to a data sink and to record information associated with the data sink into the sink tracking object. The source tracking object, the flow tracking object, and the sink tracking object are output as dynamic analysis of dataflow in the application program. | 2015-04-30 |
20150121534 | CONTENT MANAGEMENT USING MULTIPLE ABSTRACTION LAYERS - Systems, devices, methods and computer program products improve various aspects of a content management system. In one scenario, one or more contents are accessed at a content handling device. The content handling device is configured to operate using multiple abstraction layers including an application layer, an operating system layer, a firmware layer and a hardware layer. Content management operations are conducted on the one or more contents using at least two abstraction layers. Such content management operations include conducting watermark extraction and content screening operations at a first layer for a first watermark message having a first value, conducting watermark extraction and content screening operations at a second layer for a second watermark message having a second value, and initiating one or more enforcement actions corresponding to the first value and the second value based at least in-part on respective results of the content screening. | 2015-04-30 |
20150121535 | MANAGING GEOGRAPHICAL LOCATION INFORMATION FOR DIGITAL PHOTOS - Techniques are described for managing geographical location information for digital photos. For example, sensitive geographical areas can be created and privacy options defined for managing digital photos taken within the sensitive geographical areas. The privacy options can comprise an option to not include the current geographical location in digital photos when taken and an option to include a generalized geographical location, instead of the current geographical location, in digital photos when taken. Geographical location information can also be managed when digital photos are shared. | 2015-04-30 |
20150121536 | METHODS AND APPARATUS FOR PROTECTING SOFTWARE FROM UNAUTHORIZED COPYING - A processing device provides a method for protecting a program from unauthorized copying. The processing device may include an encrypted version of the program. According to one example method, the processing device creates a secure enclave, and in response to a request to execute the encrypted program, the processing device automatically generates a decrypted version of the program in the secure enclave by decrypting the encrypted program in the secure enclave. After automatically generating the decrypted version of the program in the secure enclave, the processing device may automatically execute the decrypted version of the program in the secure enclave. Other embodiments are described and claimed. | 2015-04-30 |
20150121537 | Secure Erase in a Memory Device - The various implementations described herein include systems, methods and/or devices used to enable secure erase in a memory device. In one aspect, the method includes detecting a secure erase trigger. The method further includes determining a secure erase algorithm from among one or more secure erase algorithms to use in accordance with the detected secure erase trigger. The method further includes performing a secure erase operation in accordance with the selected secure erase algorithm, the secure erase operation including: (1) signaling a secure erase condition to a plurality of controllers on the memory device, (2) erasing one or more non-volatile memory devices on the memory device, (3) monitoring the secure erase operation, and (4) recording data related to the secure erase operation. | 2015-04-30 |
20150121538 | TECHNIQUES FOR MANAGING SECURITY MODES APPLIED TO APPLICATION PROGRAM EXECUTION - A device includes a memory and a processor coupled to the memory. The processor is configured to execute a management program, an application program, and a first security module. The management program presents a first list associated with the first security module to a user that includes a first item that represents the application program. The application program is executed in a security mode that is governed by the first security module when the first item is selected. | 2015-04-30 |
20150121539 | METHOD FOR USING RIGHTS TO CONTENTS - A method of using rights corresponding to broadcast contents in a terminal having a memory card attached thereto. The method according to one embodiment includes checking, by the terminal, whether or not rights corresponding to broadcast contents include a constraint for verifying an existence of the memory card and an existence of the rights within the memory card; and if the rights include the constraint, performing, by the terminal, a procedure for verifying the existence of the memory card and the existence of the rights within the memory card through an SRM Ping protocol, the performing the procedure for verifying including transmitting, from the terminal to the memory card, a request message, receiving, by the terminal, a response message, and continuing/initiating or stopping/not initiating a consumption of the rights. The constraint includes at least one of a synchronized element, a sync Threshold element, and a check Interval element. | 2015-04-30 |
20150121540 | Software and Inventory Licensing System and Method - A system for distributing a license key for upgrading an access control system. A portable token that includes first and second identifiers, such as a visible serial number and a concealed control number that can be derived from the serial number. The access control system is identified by a third identifier, such as a MAC address. A license server generates a license key from the first, second and third identifiers that is operative to allow access to software features that are resident on the access control system without the need for an Internet connection. | 2015-04-30 |
20150121541 | AUTOMATICALLY PRESENTING RIGHTS PROTECTED CONTENT ON PREVIOUSLY UNAUTHORIZED DEVICE - A first consumer electronics device includes a computer readable storage medium bearing instructions executable by a processor, and a processor configured for accessing the computer readable storage medium to execute the instructions to configure the processor for receiving a signal indicative of close proximity of the first CE device to a second CE device. The instructions also configure the processor for providing a private key to the second CE device in response to receiving the signal. The private key is associated with a digital rights management (DRM) account for which the first CE device has been configured to access, and is configured for a single use by the second CE device to access a first audio video (AV) content without the second CE device communicating any other authentication information associated with the DRM account to access the first AV content to a content provider associated with the first AV content. | 2015-04-30 |
20150121542 | INFORMATION PROCESSING DEVICE, NON-TRANSITORY COMPUTER READABLE MEDIUM, AND INFORMATION PROCESSING METHOD - An information processing device includes a processing-type accepting unit that accepts a type of first processing of data, a data accepting unit that accepts post-processing data, the post-processing data being data on which the first processing accepted by the processing-type accepting unit has been executed, and a data processing unit that determines a data confidentiality level indicating a degree of confidentiality of the post-processing data, on a basis of a first confidentiality level associated with the type of the first processing, and executes second processing according to the data confidentiality level with respect to the post-processing data. | 2015-04-30 |
20150121543 | Method and Terminal Device for Protecting Application Program - The present disclosure relates to a method for protecting an application program in a terminal device, and a terminal device thereof. The method includes: intercepting a request for starting an application program; determining whether the application program needs protection; and starting a protection interface before starting the application program, if the application needs protection. According to the present disclosure, the protection interface is launched before starting the application program when the terminal device detects that the application program needs protection, thereby protecting the application program comprehensively and thoroughly. | 2015-04-30 |
20150121544 | ACCOUNT MANAGEMENT METHOD AND ASSOCIATED APPARATUS AND SYSTEM - A method, apparatus and system for securely managing account information are disclosed. In some embodiments, the method is performed at a computer system having one or more processors and memory for storing programs to be executed by the one or more processors. The method includes receiving a request associated with an account. The request includes location verification information. The method includes retrieving, in response to the request, information of a set of predefined locations associated with the account. The method also includes comparing information of the set of predefined locations with the received location verification information to determine whether the received location verification information satisfies a predefined condition. The method further includes sending a response to the request to a destination associated with the account when the received location verification information satisfies the predefined condition. The response includes confidential information associated with the account. | 2015-04-30 |
20150121545 | SECURITY DESCRIPTORS FOR RECORD ACCESS QUERIES - Embodiments regard security descriptors for record access queries. An embodiment of a method includes: receiving a record access query, the query regarding records for a certain one or more users, groups, or both at a certain access level; searching one or more sharing tables of entities in a computing environment for security descriptors, each security descriptor being associated with a set of one or more users, groups, or both having access to one or more records of a set of records at an access level; identifying any security descriptors in the one or more sharing tables that relate to the certain one or more users, groups, or both with at least the certain access level; and searching the one or more records associated with each of the identified security descriptors according to the record access query. | 2015-04-30 |
20150121546 | Device and Process for Restricting Access to Features on Electronic Devices Based on the Size of the Surface Area of the Finger and Other Factors - An electronic device configured to restrict access to features includes a processor configured to execute instructions and a display device configured to generate an interface based in part in response to the processor. The electronic device further includes a touch screen associated with the display device and configured to sense a user input, wherein the input is provided to the processor, a memory configured to store the instructions to operate the electronic device, the processor further configured to determine at least one of a physical aspect of the user input and a user interaction with the electronic device, the processor further configured to execute a plurality of features associated with the electronic device, and the processor further configured to disable some of the features based on the determination of at least one of a physical aspect of the user input and a user interaction with the electronic device. | 2015-04-30 |
20150121547 | System and method for peer-to-peer lending of digital content within an expanded social network - The invention is directed toward a system and method for peer-to-peer lending of digital content within an expanded social network. The invention provides for systems and methods for the searching of users with a particular digital content, displaying the digital content owned by users within a borrowers' expanded social network, requesting of the loaning of the digital content from lender(s), and the tracking of loaned digital content, either connected to a network or via in-person transfer of digital content. In addition, embodiments of the present invention provide systems and methods to allow for the borrower to add and share annotations (such as notes or multimedia annotations) to the digital content. The system comprises a client computer connected to a server computer with a database through the internet, an interface software module, a social networking software module, a content management software module, and a user annotation software module. | 2015-04-30 |
20150121548 | System and method for protected publication of sensitive documents - Protected publication of sensitive documents with authentication and accountability enables storing and sharing confidential files, while reducing risk that a recipient will distribute and share the file information with unauthorized recipients. Every user request for an original file generates a unique provided file based on the original file, the user request, and configuration information. The provided file has characteristics that make the provided file based on a first user request unique from any other provided file based on any other user request. Unique characteristics include changing the format of the original file to another format for the provided file, altering file properties, altering file content, and watermarking. | 2015-04-30 |
20150121549 | ACCESSING PROTECTED CONTENT FOR ARCHIVING - According to one embodiment of the present invention, a system for accessing protected content includes a first computing device with at least one processor. The system determines one or more users associated with information required to access content of a protected document based on a set of rules. A request is generated and sent to at least one second computing device associated with the one or more determined users to retrieve and utilize the required information to access the content of the protected document. Embodiments of the present invention further include a method and computer program product for accessing protected content in substantially the same manner described above. | 2015-04-30 |
20150121550 | DATA MANAGEMENT SERVER AND DATA MANAGEMENT PROGRAM - A processing right data management server includes an authority data DB that stores authority data, provides an organization list screen displaying a list of organizations in response to a request from a user terminal used by a user, receives from the user terminal an organization designated on the organization list screen, identifies the authority data corresponding to the designated organization, provides, according to the identified authority data, an authority setting screen configured to display a list of the business processes and processing rights corresponding to the business processes, receives, from the user terminal, settings change information regarding the processing right whose settings have been changed on the authority setting screen, and updates the authority data according to the settings change information regarding the received processing right. | 2015-04-30 |
20150121551 | SYSTEM AND METHOD FOR SECURING THE LIFE-CYCLE OF USER DOMAIN RIGHTS OBJECTS - In a method for enabling support for backwards compatibility in a User Domain, in one of a Rights Issuer (RI) and a Local Rights Manager (LRM), a Rights Object Encryption Key (REK) and encrypted REK are received from an entity that generated a User Domain Authorization for the one of the RI and the LRM and the REK is used to generate a User Domain Rights Object (RO) that includes the User Domain Authorization and the encrypted REK. | 2015-04-30 |
20150121552 | SOFTWARE UTILIZATION PRIVILEGE BROKERING IN A NETWORKED COMPUTING ENVIRONMENT - Embodiments of the present invention provide a subscription service for documenting, verifying, administering, and auditing use of entitled software products in third-party networked computing environments (e.g., a cloud computing environment). Specifically, aspects of the invention provide an Entitlement Brokering System (EBS) (also referred to as an entitlement broker) that reduces the risk associated with clients improperly running licensed software products on their computing infrastructure, thus increasing the reliability and auditability of the software product's entitlement status and accelerating intake of new or existing clients through automation of the entitlement verification process. | 2015-04-30 |
20150121553 | SYSTEM AND METHOD FOR CODE PROTECTION - Systems, methods, and techniques are disclosed for. An example method of providing code protection includes identifying a set of methods including one or more code portions to extract from an application. The method also includes extracting the one or more code portions from the set of methods. The one or more extracted code portions is executable on a computing device remote from a client. The method further includes inserting an interface into the application. The interface enables the client to remotely execute the one or more extracted code portions. The method also includes transmitting the application including the interface and without the one or more extracted code portions to the client. | 2015-04-30 |
20150121554 | PROXY DEVICE FOR MANAGING DIGITAL RIGHTS - A system and method relate to a platform for distributing digital contents (digital content) to various client devices. A digital rights management platform allows a content provider to forward digital contents that is automatically ingested and processed in accordance with various requirements associated with providing the digital contents to the client devices. Information regarding the ingested digital contents may be provided to a coordinator device that uses this information to form a digital rights locker associated with the digital contents. A client device accesses the digital rights locker to obtain a rights token, or a proof of purchase, that is used to obtain rights data for accessing the digital contents. | 2015-04-30 |
20150121555 | TOKEN BASED CLUB DIGITAL CONTENT LICENSING METHOD - A method and apparatus for token based club digital content licensing are disclosed. Token based club digital content licensing may include receiving, from a first user device, at a server, a first request for access to a first digital content object, wherein the first request indicates a first unique user identifier associated with a digital content licensing group, wherein the digital content licensing group is associated with an available shared license unit count and an unavailable shared license unit count, identifying a first assigned unit count for the first digital content object, performing license unit based digital content access control in response to receiving the first request. In some embodiments, on a condition that the first assigned unit count is within the available shared license unit count, license unit based digital content access control may include enabling access to the first digital content object by the first user device. | 2015-04-30 |
20150121556 | INDUSTRIAL EQUIPMENT MANAGEMENT SYSTEM, INDUSTRIAL EQUIPMENT MANAGEMENT SERVER, INDUSTRIAL EQUIPMENT MANAGEMENT METHOD, AND INFORMATION STORAGE MEDIUM - An individual area controller of an industrial equipment management system controls access to an individual area which is a storage area that is associated with an individual ID on a server, based on the individual ID. A group area controller controls access to a group area which is a storage area that is associated with a group ID on a server, based on the individual ID that belongs to the group ID. A copy restrictor restricts copying of equipment information about an industrial equipment that is stored in the group area to the individual area. | 2015-04-30 |
20150121557 | CELERY CULTIVAR ADS-25 - A celery cultivar, designated ADS-25, is disclosed. The invention relates to the seeds of celery cultivar ADS-25, to the plants of celery cultivar ADS-25 and to methods for producing a celery plant by crossing the cultivar ADS-25 with itself or another celery cultivar. The invention further relates to methods for producing a celery plant containing in its genetic material one or more transgenes and to the transgenic celery plants and plant parts produced by those methods. This invention also relates to celery cultivars or breeding cultivars and plant parts derived from celery cultivar ADS-25, to methods for producing other celery cultivars, lines or plant parts derived from celery cultivar ADS-25 and to the celery plants, varieties, and their parts derived from the use of those methods. The invention further relates to hybrid celery seeds, plants, and plant parts produced by crossing cultivar ADS-25 with another celery cultivar. | 2015-04-30 |
20150121558 | CELERY CULTIVAR ADS-26 - A celery cultivar, designated ADS-26, is disclosed. The invention relates to the seeds of celery cultivar ADS-26, to the plants of celery cultivar ADS-26 and to methods for producing a celery plant by crossing the cultivar ADS-26 with itself or another celery cultivar. The invention further relates to methods for producing a celery plant containing in its genetic material one or more transgenes and to the transgenic celery plants and plant parts produced by those methods. This invention also relates to celery cultivars or breeding cultivars and plant parts derived from celery cultivar ADS-26, to methods for producing other celery cultivars, lines or plant parts derived from celery cultivar ADS-26 and to the celery plants, varieties, and their parts derived from the use of those methods. The invention further relates to hybrid celery seeds, plants, and plant parts produced by crossing cultivar ADS-26 with another celery cultivar. | 2015-04-30 |
20150121559 | TOMATO HYBRID SV2794TD AND PARENTS THEREOF - The invention provides seed and plants of tomato hybrid SV2794TD and the parent lines thereof. The invention thus relates to the plants, seeds and tissue cultures of tomato hybrid SV2794TD and the parent lines thereof, and to methods for producing a tomato plant produced by crossing such plants with themselves or with another tomato plant, such as a plant of another genotype. The invention further relates to seeds and plants produced by such crossing. The invention further relates to parts of such plants, including the fruit and gametes of such plants. | 2015-04-30 |
20150121560 | TOMATO HYBRID SV4725TD AND PARENTS THEREOF - The invention provides seed and plants of tomato hybrid SV4725TD and the parent lines thereof. The invention thus relates to the plants, seeds and tissue cultures of tomato hybrid SV4725TD and the parent lines thereof, and to methods for producing a tomato plant produced by crossing such plants with themselves or with another tomato plant, such as a plant of another genotype. The invention further relates to seeds and plants produced by such crossing. The invention further relates to parts of such plants, including the fruit and gametes of such plants. | 2015-04-30 |
20150121561 | Method for Protein Production in Doubled Haploid Plants - A method to provide transgenic doubled haploid plants is provided. The doubled haploid plants of this disclosure express heterologous gene products in their seeds. The disclosure also provides a clonal-like isogenic production system in dicotyledonous plant seeds where transgene expression can be controlled. The disclosure specifically provides a system to produce high quality and quantity of heterologous gene product in doubled haploid | 2015-04-30 |
20150121562 | PEA LINE DLSC709-1058 - The invention provides seed and plants of the pea line designated DLSC709-1058. The invention thus relates to the plants, seeds and tissue cultures of pea line DLSC709-1058, and to methods for producing a pea plant produced by crossing a plant of pea line DLSC709-1058 with itself or with another pea plant, such as a plant of another line. The invention further relates to seeds and plants produced by such crossing. The invention further relates to parts of a plant of pea line DLSC709-1058, including the seed, pod, and gametes of such plants. | 2015-04-30 |
20150121563 | LETTUCE VARIETY 45-101 RZ - The present invention relates to a | 2015-04-30 |
20150121564 | TOMATO HYBRID EX15567101 AND PARENT LINES THEREOF - The invention provides seed and plants of tomato hybrid EX15567101 and the parent lines thereof. The invention thus relates to the plants, seeds and tissue cultures of tomato hybrid EX15567101 and the parent lines thereof, and to methods for producing a tomato plant produced by crossing such plants with themselves or with another tomato plant, such as a plant of another genotype. The invention further relates to seeds and plants produced by such crossing. The invention further relates to parts of such plants, including the fruit and gametes of such plants. | 2015-04-30 |
20150121565 | LETTUCE VARIETY 79-504 RZ - The present invention relates to a | 2015-04-30 |
20150121566 | LETTUCE VARIETY 45-189 RZ - The present invention relates to a | 2015-04-30 |
20150121567 | LETTUCE VARIETY 45-158 RZ - The present invention relates to a | 2015-04-30 |
20150121568 | OVULE SPECIFIC PROMOTER AND METHODS OF USE - Compositions and methods for regulating expression of heterologous nucleotide sequences in a plant are provided. Compositions include nucleotide sequences for an | 2015-04-30 |
20150121569 | MICROPEPTIDES AND USE THEREOF FOR MODULATING GENE EXPRESSION - Process for detecting and identifying micropeptides (miPEPs) encoded by a nucleotide sequence contained in the sequence of the primary transcript of a microRNA and use thereof for modulating gene expression. | 2015-04-30 |
20150121570 | GENE IMPLICATED IN DROUGHT STRESS TOLERANCE AND TRANSFORMED PLANTS WITH THE SAME - The present invention relates to a composition for improving a tolerance to drought and oxidative stress of a plant, a plant transformed with the composition, a method for preparing a plant transformed with the composition, a method for improving a tolerance to a drought and oxidative stress and a composition and method for a germination rate of a plant. The nucleotide sequences of the present invention are involved in the drought and oxidative stress-tolerance and germination capacity, therefore may be effectively used for cultivating the plants with enhanced tolerance against abiotic stress or novel function of rapid growing or bolting. | 2015-04-30 |
20150121571 | GENES RELATED TO SALT OR DROUGHT STRESS RESISTANCES AND TRANSFORMED PLANTS WITH THE SAME - The present invention relates to a composition for improving a tolerance to a salt stress or a drought stress of a plant, and a method for preparing transformed plant exhibiting improved tolerance to salt stress or drought stress. The nucleotide sequences of the present invention are involved in salt or drought stress-tolerance, therefore may be effectively used for cultivating the plants with novel functional features which are less affected by climates and environments of the cultivated areas. | 2015-04-30 |
20150121572 | PLANTS HAVING ALTERED EXPRESSION AND ACTIVITY OF YIELD-RELATED PROTEINS - Transgenic plants that have enhanced yield-related traits, such as increased seed oil production, are produced by genetically engineering the plants to down-regulate the expression of at least one BPM protein. Such transgenic plants can, for example, be cultivated and yield higher seed oil production than control plants which have not been genetically engineered for down regulation of a BPM protein. | 2015-04-30 |
20150121573 | ISOLATED POLYPEPTIDES, POLYNUCLEOTIDES ENCODING SAME, TRANSGENIC PLANTS EXPRESSING SAME AND METHODS OF USING SAME - Nucleic acid constructs are provided. These constructs comprise any of the, nucleic acid sequences at least 85% identical to nucleotide sequences selected from the group consisting of SEQ ID NOs: 68, 1, 4, 5, 8, 9, 11, 13, 16, 19, 20, 23, 24, 27, 30, 32, 37, 42, 49, 50, 51, 53, 54, 55, 56, 57, 58, 64, 69, 70, 73, 77, 78, 79, 80, 84, 86, 87, 93, 94, 98, 101, 102, 103, 104, 105, 106, 107, 108 and 109 and a promoter sequence capable of directing transcription of said nucleic acid sequence in a host cell. Also provided are transgenic plants expressing these nucleic acid constructs and methods of using same. | 2015-04-30 |
20150121574 | METHOD OF MERISTEM EXCISION AND TRANSFORMATION - The present invention relates to excision of explant material comprising meristematic tissue from cotton seeds. Methods for tissue preparation, storage, transformation, and selection or identification of transformed plants are disclosed, as are transformable meristem tissues and plants produced by such methods, and apparati for tissue preparation. | 2015-04-30 |
20150121575 | DEVICE AND METHOD FOR MEASURING DISTRIBUTION OF ATOMIC RESOLUTION DEFORMATION - The present invention relates to an atomic resolution deformation distribution measurement device that can measure a deformation rate of an atomic scale with low expense by improving resolution using an AFM system, and the atomic resolution deformation distribution measurement device includes: a laser source generating a laser beam; a first cantilever and a second cantilever provided close to a measurement specimen or a reference specimen to cause deformation by an atomic force; an optical system controlling a light path of the laser beam so as to cause the laser beam to be sequentially reflected to the first cantilever and the second cantilever and locate the first cantilever and the second cantilever to an image point; a measurement unit measuring the laser beam reflected from the second cantilever; and a stage on which a measurement specimen or a reference specimen is located and movable in X, Y, and Z axis directions. | 2015-04-30 |
20150121576 | DETERMATION OF LOCAL CONTACT POTENTIAL DIFFERENCE BY NONCONTACT ATOMIC FORCE MICROSCOPY - A method for determining a value of a local contact potential difference by noncontact atomic force microscopy. For one or more cantilever positions above a surface of a sample: i) performing two atomic force microscopy measurements, using an oscillating cantilever, ii) thereby determining two distinct voltage values of DC voltage applied between the cantilever and the sample, and iii) obtaining a value of a local contact potential difference based, at least in part, on the two distinct voltage values determined. Wherein substantially similar distinct values indicate a substantially similar value of frequency shifts of cantilever oscillation, as measured for each of said distinct values. | 2015-04-30 |
20150121577 | Plum tree named Suplumfortyfive - A new and distinct plum tree variety, | 2015-04-30 |
20150121578 | Nectarine tree named sunectwentythree - A new and distinct nectarine tree variety, | 2015-04-30 |
20150121579 | Grapevine 'Sheegene-22' - A new and distinct variety of grapevine characterized by the production of medium, red-colored seeded grapes that mature in early September, approximately two to three weeks later than ‘Red Globe’(U.S. Plant Pat. No. 4,787) when grown in the San Joaquin Valley of Central California. The grapes of this new variety are produced on strong woody stems and branches and are well adapted to commercial handling. | 2015-04-30 |
20150121580 | Ficus elastica plant named 'NAIROBI' - A new and distinct | 2015-04-30 |
20150121581 | Michelia plant named 'MICJUR05' - A new and distinct | 2015-04-30 |
20150121582 | Rhododendron plant named 'HOMLEA' - A new and distinct | 2015-04-30 |
20150121583 | Rhododendron plant named 'HOMLED' - A new and distinct | 2015-04-30 |
20150121584 | Rhododendron plant named 'HOMLEB' - A new and distinct | 2015-04-30 |
20150121585 | Rhododendron plant named 'HOMLEE' - A new and distinct | 2015-04-30 |
20150121586 | Rhododendron plant named 'HOMLEC' - A new and distinct | 2015-04-30 |
20150121587 | Buddleia plant named 'PIIBD-III' - A new and distinct cultivar of | 2015-04-30 |
20150121588 | Rheum plant named 'SCARLET KING' - A new and distinct | 2015-04-30 |
20150121589 | Vriesea plant named 'V807-1' - A new and distinct | 2015-04-30 |
20150121590 | Vriesea plant named 'V858-2' - A new and distinct | 2015-04-30 |
20150121591 | Phalaenopsis orchid plant named 'PHALDOMEO' - A new and distinct variety of | 2015-04-30 |
20150121592 | Anthurium plant named 'ANTHDINWAQ' - A new and distinct variety of | 2015-04-30 |
20150121593 | Guzmania plant named 'BUNDEWH' - A new and distinct | 2015-04-30 |
20150121594 | Echinacea plant named 'Fourth of July' | 2015-04-30 |
20150121595 | Hypericum plant named 'RUIHYH009A' | 2015-04-30 |
20150121596 | Hypericum plant named 'RUIHYG219A' | 2015-04-30 |
20150121597 | Hypericum plant named 'RUIHYH002A' | 2015-04-30 |