06th week of 2014 patent applcation highlights part 77 |
Patent application number | Title | Published |
20140041009 | INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD AND PROGRAM - There is provided an information processing apparatus including a non-contact communication section that performs non-contact communication with a communication device which stores at least two pieces of software outputting information necessary for enjoying a predetermined service provided by a server, an obtaining section that obtains connection target information for connecting to the server and identification information indicating the software corresponding to the connection target information, and a control section that performs control of, via the non-contact communication section, issuing an instruction to the communication device to execute the software indicated by the identification information, obtaining an execution result of the software executed in accordance with the instruction, and transmitting the execution result to the server. | 2014-02-06 |
20140041010 | SYSTEMS AND METHODS FOR POLICY BASED TRIGGERING OF CLIENT-AUTHENTICATION AT DIRECTORY LEVEL GRANULARITY - Systems and methods are disclosed for an appliance to authenticate access of a client to a protected directory on a server via a connection, such as a secure SSL connection, established by the appliance. A method comprises the steps of: receiving, by an appliance, a first request from a client on a first network to access a server on a second network, the appliance providing the client a virtual private network connection from the first network to the second network; determining, by the appliance, the first request comprises access to a protected directory of the server; associating, by the appliance, an authentication policy with the protected directory, the authentication policy specifying an action to authenticate the client's access to the protected directory; and transmitting, by the appliance in response to the authentication policy, a second request to the client for an authentication certificate. Corresponding systems are also disclosed. | 2014-02-06 |
20140041011 | METHOD AND DEVICE FOR CONTROL COMMUNICATION BETWEEN COUPLED TRAIN COMPONENTS - A method for control communication between coupled train components, wherein mechanical and electrical couplings as well as devices for exchanging data are present. When a first train component is coupled to at least one further train component, the at least one further train component is identified, and filtering for a permissible data communication is performed as a function of the identification in that only selected data traffic is permitted. Furthermore, a device for control communication between coupled train components is described, wherein the train buses thereof are connected via an electrical coupling, and the data communication to the respective other train component is conducted via at least one gateway with at least one Ethernet interface as well as via at least one interface for connection of each component network. As a result, the data communication of a filter policy/rule is permitted or blocked. | 2014-02-06 |
20140041012 | SYSTEM FOR THE MANAGEMENT OF ACCESS POINTS - A network management system for the management of remote networks located behind a firewall. A managed device establishes a connection with the firewall. The managed device then generates and transmits a data packet to the firewall. The firewall then redirects the data packet to a controller server. Based on the information contained in the data packet, the controller server will verify the authenticity of the managed device. Based on the outcome of the verification process, the controller server will then carry out the necessary actions. | 2014-02-06 |
20140041013 | METHOD AND SYSTEM FOR MESSAGING SECURITY - An e-mail firewall applies policies to e-mail messages transmitted between a first site and a plurality of second sites. The e-mail firewall includes a plurality of mail transfer relay modules for transferring e-mail messages between the first site and one of the second sites. Policy managers are used to enforce and administer selectable policies. The policies are used to determine security procedures for the transmission and reception of e-mail messages. The e-mail firewall employs signature verification processes to verify signatures in received encrypted e-mail messages. The e-mail firewall is further adapted to employ external servers for verifying signatures. External servers are also used to retrieve data that is employed to encrypt and decrypt e-mail messages received and transmitted by the e-mail firewall, respectively. | 2014-02-06 |
20140041014 | METHODS AND SYSTEMS FOR ROUTING PACKETS IN A VPN-CLIENT-TO-VPN-CLIENT CONNECTION VIA AN SSL/VPN NETWORK APPLIANCE - In a method and system for routing packets between clients, a packet is received from a first client connected to a secure sockets layer virtual private network (an SSL/VPN) network appliance. An identification is made, responsive to an inspection of the received packet, of i) a type of connection required for transmission of the received packet to a destination address identified by the received packet and ii) a second client connected via an SSL/VPN connection to the SSL/VPN network appliance and associated with the identified destination address. A request is made for establishment by the second client of a connection of the identified type within the SSL/VPN connection. The received packet is transmitted to the second client via the established connection of the identified type. | 2014-02-06 |
20140041015 | Systems and Methods of Exchanging Information for a Reward - Systems and methods for exchanging information for access to a computing resource are provided herein. Methods may include receiving a request to access a computing resource, the computing resource being selectively unavailable to the information provider, responsive to receiving the request, providing the information provider a problem that is to be solved by the information provider prior to making the computing resource selectively available to the information provider, wherein solving the problem elicits desired information from the information provider, and responsive to receiving the desired information, selectively making the computing resource available to the information provider. | 2014-02-06 |
20140041016 | PROVIDING REMOTELY DEFINED SECURITY DATA TO A LOCAL APPLICATION EXTENSION - Systems and methods, including computer software adapted to perform certain operations, can be implemented for providing remotely defined security data to an application extension on a client device. A sequence of instructions and at least one permission indicator associated with the sequence of instructions are received. A first permission indicator is associated with a code extension to a software application adapted to execute at least a portion of the sequence of instructions. The code extension is adapted to perform one or more operations that supplement the operations supported by the software application. An instruction within the sequence of instructions associated with adapted for execution by the code extension and with an activity is identified. The first permission indicator is provided to the code extension. The code extension determines whether performance of the activity is permitted based, at least in part, on the first permission indicator. | 2014-02-06 |
20140041017 | LAW ENFORCEMENT AGENCY PORTAL - Implementations of the present disclosure involve a system and/or method for providing account information for a telephone number. All users are authenticated to ensure they may access the account information. Once authenticated, the user provides one or more telephone numbers that they would like to retrieve account information for. The system searches for the telephone number and if found, checks to ensure that the telecommunications provider services the phone number. When the telecommunications provider is the provider for the phone number, the record is retrieved and sent to the user. | 2014-02-06 |
20140041018 | TOKENIZED DATA SECURITY - Provided are devices, methods, systems, computer readable storage media and other means for tokenizing data. In some examples, credit card numbers are tokenized using a pre-generated token map and absent the use of a networked database that stores a relatively large quantity of credit card numbers in a central location. The token map may be generated by a token map generator such that the token map can be used by a tokenizer to replace a portion of an account number with a token, and by a detokenizer to replace the token with the original portion of the account number. A pre-parser and parser may also be used to locate an account number and/or token in a message received over a network. | 2014-02-06 |
20140041019 | ELECTRONIC DEVICE AND METHOD FOR HIDING LOGIN INFORMATION - A method for hiding login information on an electronic device includes determining whether the electronic device generates a login interface for indicating a user to input account information and password; stopping sending display information of the electronic device to an external electronic device when the electronic device generates the login interface for indicating the user to input account information and password; receiving input account information and password; determining whether the user finishes inputting account information and password; sending the display information of the electronic device to the external electronic device when the user finishes inputting account information and password or logs into the electronic device according to the input account information and password. The electronic device is also described. | 2014-02-06 |
20140041020 | ORIENTATION AWARE AUTHENTICATION ON MOBILE PLATFORMS - Systems and methods may provide for receiving an authentication input and determining an authentication orientation of a mobile platform during entry of the authentication input. In addition, a determination may be made as to whether to validate a user based on the authentication input and the authentication orientation of the mobile platform. Platform orientation may also be used to detect malware. | 2014-02-06 |
20140041021 | APPARATUS, METHODS, AND COMPUTER PROGRAM PRODUCTS FOR ENTERING SECURE PASSWORDS - Apparatus, methods and/or computer program products are provided that facilitate entering secure passwords into a user device. A user requested image is displayed via a display or monitor of a user device. The image is zoomable to one or more higher resolution levels beyond an initial display resolution, and the image is displayed at higher resolution levels in response to a user activating a zoom function via the user device. The coordinates of a user selected feature within a displayed higher resolution level image are obtained and translated into a password. The password is then entered into the requesting application. | 2014-02-06 |
20140041022 | METHOD AND APPARATUS FOR PROVIDING NOTIFICATION OF DETECTED ERROR CONDITIONS IN A NETWORK - Methods for managing a communication session in a communication network are disclosed. For example, a method includes detecting, by a first endpoint comprising at least one processor, an error condition associated with the communication session, sending, by the first endpoint, a notification of the error condition to a second endpoint that is using a transport layer session and receiving, by the first endpoint, a communication from the second endpoint, proposing a response to the error condition. Another method includes receiving, by a first endpoint comprising at least one processor, a notification of an error condition associated with the communication session, selecting, by the first endpoint, a response to the error condition, and sending, by the first endpoint, a communication to a second endpoint that is using a transport layer session, proposing a response to the error condition. | 2014-02-06 |
20140041023 | FLEXIBLE AND SECURE CLICKJACKING PROTECTION MECHANISM - Methods, systems, and computer-readable storage media for preventing a clickjacking attack on a web page. Implementations include inhibiting rendering of content of the web page, receiving a message from an embedding web page, the embedding web page having called the web page, the message including metadata, and determining whether the embedding web page is trusted based on the metadata, wherein rendering of content of the web page remains inhibited if the embedding web page is untrusted, and rendering of content of the web page is executed if the embedding web page is trusted. | 2014-02-06 |
20140041024 | Method and Apparatus for Baiting Phishing Websites - A cyber fraud phish baiting system for baiting a phishing website is disclosed. The cyber fraud phish baiting system is configured to store a plurality of URLs in a database and enter each of the URLs into a browser to view internet resources linked to the URLs. It is configured to scan the internet resources for information requests, obtain information responsive to the information requests from a database, enter responsive information into the information requests, and store the information requests and the responsive information entered into the information requests for each of the URLs. The internet resource may be a phishing website, and fake information is entered into the information requests. | 2014-02-06 |
20140041025 | DEFENDING AGAINST BROWSER ATTACKS - In one example the opening of a primary browser to a URL may be detected, a reference browser may then be opened to the same URL, data input to respective data fields on the primary browser may be copied to respectively corresponding data fields on the reference browser, and security on the primary browser may be evaluated based on, at least, the data copied to the reference browser. | 2014-02-06 |
20140041026 | Hybrid Virtual Machine - A method and system are disclosed for a hybrid virtual machine that allows untrusted software programs to be run securely and with high performance on computers having processors that lack hardware-assisted memory management. Contemporary computer platforms built to enable application developers to deploy software (“apps”) typically employ (a) hardware assisted memory-management and an operating system that “sandboxes” applications' access to hardware peripherals or (b) an interpreted code execution environment that acts as an insulating layer between running application code and the underlying computer hardware, with the environment configured to prevent inappropriate actions. Both contemporary approaches require a processor with a certain base level of performance and/or built-in features, which increases hardware costs. The present invention satisfies the goals of more expensive platforms but is operable on hardware with lesser performance capabilities and/or fewer features. | 2014-02-06 |
20140041027 | SAFE COMMAND EXECUTION AND ERROR RECOVERY FOR STORAGE DEVICES - Techniques for execution of commands securely within a storage device are disclosed. Integrity of a command interpreter is verified before allowing it to execute commands within the storage device. The integrity of the commands can also be checked to safeguard against various threats including, for example, malicious attacks, unintentional errors and defects that can adversely affect stored content and execution. Error recovery techniques can be used to reconstruct the command interpreter and/or commands that are found to be defective. In addition, secure techniques can be used to obtain trusted versions of the command interpreter and/or commands from an authenticated external source. | 2014-02-06 |
20140041028 | System and Method for Assessing Whether a Communication Contains an Attack - Communications can be processed with multiple countermeasures to identify attacks. Each countermeasure can compute a probability of a communication containing an attack and an accompanying confidence score indicating confidence in the probability. Combining the probabilities can produce a composite probability and associated confidence of the communication containing an attack. The composite probability and confidence scores can be produced from a weighted combination of the individual countermeasure probabilities and confidence scores. Weighting factors can be generated or obtained from a database that stores profiles of confirmed attacks. | 2014-02-06 |
20140041029 | METHOD AND SYSTEM FOR PROCESSING WEBSITE ADDRESS RISK DETECTION - Disclosed are a method and a device for processing URL risk detection, which belong to the field of computer technologies. The method comprises: querying a risk type of a URL for detection; querying a configuration file according to the risk type of the URL for detection, to obtain a corresponding risk level and processing policy, the configuration file including a correspondence relation between a risk type, a risk level and the processing policy; and processing the URL for detection according to the risk level and the processing policy. In the present disclosure, the risk level is determined according to the risk type of the URL for detection, and the corresponding processing policy is obtained, different types of URLs processed according to different risk levels and processing policies, so that URLs having a risk can be intercepted using diversified methods; moreover, when the risk type is determined, by matching data in a pre-created risk database, the risk type of the URL for detection is obtained without the need of binding a URL risk monitoring component, the codes are concise, and the robustness is strong. | 2014-02-06 |
20140041030 | SYSTEM FOR FINDING CODE IN A DATA FLOW - A code finder system deployed as a software module, a web service or as part of a larger security system, identifies and processes well-formed code sequences. For a data flow that is expected to be free of executable or interpreted code, or free of one or more known styles of executable or interpreted code, the code finder system can protect participants in the communications network. Examples of payload carried by data flows that can be monitored include, but are not limited to, user input data provided as part of interacting with a web application, data files or entities, such as images or videos, and user input data provided as part of interacting with a desktop application. | 2014-02-06 |
20140041031 | STATISTICAL FINGERPRINTING FOR MALWARE DETECTION AND CLASSIFICATION - A system detects malware in a computing architecture with an unknown pedigree. The system includes a first computing device having a known pedigree and operating free of malware. The first computing device executes a series of instrumented functions that, when executed, provide a statistical baseline that is representative of the time it takes the software application to run on a computing device having a known pedigree. A second computing device executes a second series of instrumented functions that, when executed, provides an actual time that is representative of the time the known software application runs on the second computing device. The system detects malware when there is a difference in execution times between the first and the second computing devices. | 2014-02-06 |
20140041032 | System and Method for Detecting Network Intrusions Using Statistical Models and a Generalized Likelihood Ratio Test - A system and method for detecting network intrusions using one or more statistical models and a generalized likelihood ratio test (GLRT) is provided. The system includes a computer system and a network intrusion detection engine executed by the computer system. To detect network intrusions, the system receives network traffic data, computes a likelihood using one or more statistical models, such as an Markov-modulated Poisson process, and processes the traffic data using a GLRT. The statistical models are used to assess the likelihood of seeing a particular pattern of network traffic. The GLRT is used to classify a particular pattern as either indicative of an attack or not indicative of an attack. The system could apply one or more types of statistical models, such as in a flexible multi-tiered approach. | 2014-02-06 |
20140041033 | HARDWARE ENFORCED MEMORY ACCESS PERMISSIONS - Embodiments of apparatuses and methods for hardware enforced memory access permissions are disclosed. In one embodiment, a processor includes address translation hardware and memory access hardware. The address translation hardware is to support translation of a first address, used by software to access a memory, to a second address, used by the processor to access the memory. The memory access hardware is to detect an access permission violation. | 2014-02-06 |
20140041034 | PERFORMING VIRUS SCAN DURING DECOMPRESSION OF AN APPLICATION INSTALLATION PACKAGE - Disclosed in the present invention are a method and apparatus for checking a process of decompressing an application installation package. The present invention belongs to the technical field of security. The method comprises: decompressing a sub-portion of data in an application installation package to acquire decompressed data, the sub-portion of data being not greater than a threshold size; checking the decompressed data according to the virus samples in a virus feature library; and determining that the application installation package is a virus-infected file or rogue software when the decompressed data includes any of the virus samples. The technical solution of the present invention can effectively save the internal memory, shorten the checking time, and improve the checking efficiency in determining whether an application installation package is a virus-infected file or rogue software. | 2014-02-06 |
20140041035 | METHOD AND SYSTEM FOR FILE SCANNING - The invention relates to method and system for file scanning The method includes performing specified scanning on files of terminal equipment to determine suspicious files infected by viruses; repairing the suspicious files infected by the viruses and recording repair actions; and checking the recorded repair actions after the specified scanning is finished. The system includes a scanning module, a repairing module, and a checking module. According to the invention, repair actions performed during the repair procedure are recorded when suspicious files infected by viruses are repaired, and these recorded repair actions are checked after the repairs are finished so as to confirm the repair effect and reinforce the repair, thereby preventing suspicious files infected by various viruses from damaging and infecting the system. | 2014-02-06 |
20140041036 | ASSESSING THE RESISTANCE OF A SECURITY MODULE AGAINST ATTACKS BY COMMUNICATION PIPE DIVERSION - A method for assessing the resistance of a security module against an attempt to divert a communication pipe between a gate of this security module and a gate of a near-field communication router present in a telecommunication device to which the security module is intended to be connected, including the steps of: connecting the security module to a near-field communication router emulator; having the emulator send at least one command to the security module, this command simulating the fact that the pipe used is not connected to a near-field communication gate; and determining whether the security module accepts the commands. | 2014-02-06 |
20140041037 | DETECTING PIRATED APPLICATIONS - A method includes receiving a plurality of trusted assets, generating a first signature set for a known software application, and generating a second signature set for a subject software application. Each trusted asset is associated with at least a threshold number of trusted authors. Each signature in the first signature set corresponds to a known asset that is associated with the known software application. Each signature in the second signature set corresponds to a subject asset that is associated with the subject software application. The method further includes generating first and second filtered signature set based on the first and second signature sets, respectively, by excluding signatures corresponding to the trusted assets. The method also includes generating a similarity rating for the subject application based on a comparison of the first filtered signature set and the second filtered signature set. | 2014-02-06 |
20140041038 | RECEIVING INFORMATION ABOUT A USER FROM A THIRD PARTY APPLICATION BASED ON ACTION TYPES - A social networking system enables a third party application to request user data based on action types and aggregations of a user's data corresponding to an action type with respect to multiple objects. Users of the social networking system may provide privacy or accessibility of their information based on the action type associated with the information (e.g., a user may allow a particular application to access all actions of a certain type, regardless of the source of those actions). The third party application may use this accessed information to generate personalized content for a user based on aggregations of the user's data and then publish the personalized content back to the social networking system. | 2014-02-06 |
20140041039 | VECTORIAL PRIVATE EQUALITY TESTING - A system for equality testing, the system comprising a first client device including a first private data unit, a second client device including a second private data unit, and a server. The server receives a first obfuscated data unit corresponding to the first private data unit from the first client device, and a second obfuscated data unit corresponding to the second private data unit from the second client device. The server performs a vector calculation based on the first and second obfuscated data units to generate a combination of the first and second obfuscated data units. The server sends the combination to the first client device. The first client device is configured to determine whether the first private data unit is equal to the second private data unit based on the combination. | 2014-02-06 |
20140041040 | CREATING SECURE MULTIPARTY COMMUNICATION PRIMITIVES USING TRANSISTOR DELAY QUANTIZATION IN PUBLIC PHYSICALLY UNCLONABLE FUNCTIONS - A security method includes securely exchanging information related to delays of logic gates of a plurality of security primitives, and configuring a first and a second security primitive such that the delays associated with a subset of logic gates of the first and second security primitives match, for secure communication between the first and second security primitive. The security method may further include configuring the first security primitive and a third security primitive such that the delays associated with a subset of logic gates of the first and third security primitives match, for secure communication between the first and third security primitive. The security method may further include switching the configuration of the first security primitive in one clock cycle between the configuration for secure communication with the second security primitive and configuration for secure communication with the third security primitive. | 2014-02-06 |
20140041041 | METEOROLOGY AND OCEANOGRAPHY GEOSPATIAL ANALYSIS TOOLSET - System and method for providing access to ArcMap netCDF utilities and adding support for observational data to ArcMap including, but not limited to, comparing observational data to model data in a graphical manner, and maintaining the security classifications for each layer in ArcMap so that the highest security classification of the data being viewed is known at all times. | 2014-02-06 |
20140041042 | OBSTRUCTING USER CONTENT BASED ON LOCATION - Example embodiments disclosed herein relate to displaying private user content ( | 2014-02-06 |
20140041043 | DIGITAL RIGHTS MANAGEMENT USING DEVICE PROXIMITY INFORMATION - A method and system utilizing proximity information in managing digital rights is provided. An example method includes receiving a request to access a content item at an electronic device, determining proximity information using at least one processor, the proximity information indicating proximity of the electronic device to a designated base electronic device and using the proximity information for granting or denying access to the content item. | 2014-02-06 |
20140041044 | CONTROLLING ACCESS TO A SHARED FILE - A shared data store may be accessible to a plurality of electronic devices and used to share files in a collaboration setting. A shared file is shared by a first electronic device with a second device via a connection between the first electronic device and the shared data store. A coordinating electronic device associated with the shared data store monitors the connection with the first electronic device. If a loss in the connection is detected, the coordinating electronic device may cause access to the shared file to become restricted to the second electronic device responsive to the loss of the connection. | 2014-02-06 |
20140041045 | DIGITAL RIGHTS MANAGEMENT (DRM) LOCKER - Methods, apparatuses and storage medium associated digital rights management (DRM) using DRM locker is disclosed herein. In embodiments, a DRM locker is provided to a client device. The DRM locker may be configured to store a number of DRM licenses or keys for a number of DRM protected contents. The DRM locker, on presentation of an associated locker key, may respond to a request for one or more of the stored DRM licenses or keys, to enable consumption of the corresponding DRM protected contents using the client device. Other embodiments may be disclosed or claimed. | 2014-02-06 |
20140041046 | SYSTEMS AND METHODS FOR CONDITIONAL ACCESS AND DIGITAL RIGHTS MANAGEMENT - Conditional access (CA) and digital rights management (DRM) in digital media delivery, processing, and storage systems. Methods and apparatuses are provided for managing digital rights under the protection of multiple CA and/or DRM systems. Some embodiments provide secure and robust methods for bridging multiple DRM systems in the digital media content distribution and playback systems. The present invention simplifies content repurposing, after it has been bridged to a secondary DRM system, but still under the control of the original DRM system. | 2014-02-06 |
20140041047 | PRIVACY PRESERVING METHOD FOR SUMMARIZING USER DATA - A method includes, in a server residing in a network of interconnected computers, receiving user data, dissecting the received user data into a plurality of key/value pairs, iterating through the plurality of key/value pairs, generating a new data structure in the memory of the server for each key/value pair that do not exist, inserting a UserID into a set associated for a specific key/value pair, storing the key/value sets, and destroying the received user data. | 2014-02-06 |
20140041048 | Online Privacy Management - A privacy management system (PMS) is disclosed for a Chief Privacy Officer (CPO) or other user to use in monitoring and/or controlling in realtime the flow of data (e.g., outflow) about the user and his/her online experience. The PMS may provide a dashboard displaying a whitelist and/or blacklist indicating what destinations/sources are blocked or allowed. The PMS includes browser-client scripting code and may also include a PMS-certified verification icon for display on webpages being monitored/controlled in realtime by the PMS. | 2014-02-06 |
20140041049 | METHOD AND APPARATUS FOR VARIABLE PRIVACY PRESERVATION IN DATA MINING - Improved privacy preservation techniques are disclosed for use in accordance with data mining. By way of example, a technique for preserving privacy of data records for use in a data mining application comprises the following steps/operations. Different privacy levels are assigned to the data records. Condensed groups are constructed from the data records based on the privacy levels, wherein summary statistics are maintained for each condensed group. Pseudo-data is generated from the summary statistics, wherein the pseudo-data is available for use in the data mining application. Principles of the invention are capable of handling both static and dynamic data sets | 2014-02-06 |
20140041050 | METHOD FOR DISPLAYING INFORMATION ON A DISPLAY DEVICE OF A TERMINAL - The invention relates to a method for displaying information on a display device (D | 2014-02-06 |
20140041051 | ACCESSING MEDIA - In general, one aspect of the subject matter described in this specification can be embodied in a method for receiving a request, from an application in an application execution environment, to play a media asset that has associated media information. The application has associated application information and is restricted to an isolation environment provided by the application execution environment. In response to the request, content of the media asset is provided to a component of a computer system for playing. Access by the application to the content of the media asset during the playing is restricted based on the media information and the application information. | 2014-02-06 |
20140041052 | METHODS AND SYSTEMS FOR ESTABLISHING AND ENFORCING DOCUMENT VISIBITILY RIGHTS WITH AN ELECTRONIC SIGNATURE SERVICE - Techniques for generating and enforcing document visibility rights associated with a document in use with an electronic signature service are described Consistent with embodiments of the invention, document visibility rights can be established for each person designated to sign and/or receive a copy of a document, and on a per-page, per-document section, or per-source document basis. Additionally, visibility rights may be conditional, such that various events (including the singing of a document) may modify visibility rights making a previously un-viewable page or document section viewable to a particular person. | 2014-02-06 |
20140041053 | DATA BLOCK ACCESS CONTROL - In one implementation, a data block access system accesses access control information associated with a plurality of data blocks of a storage volume at a data store, and determines whether a user associated with a request for access to a data block from the plurality of data blocks is authorized for the requested access. The data block access system determines whether the user is authorized for the requested access based on the access control information associated with that data block. | 2014-02-06 |
20140041054 | ATTESTATION OF POSSESSION OF MEDIA CONTENT ITEMS USING FINGERPRINTS - A method for verifying a user's access to a content media item includes discovering at least one content item stored on a storage medium associated with a client device. A fingerprint of a selected portion of the media content item is obtained. The selected portion is a portion less than an entirety of the media content item. The fingerprint is communicated to an online service. Access to an online copy of the media content item is received if the fingerprint matches a known fingerprint of a media content item available to the online service. | 2014-02-06 |
20140041055 | SYSTEM AND METHOD FOR ONLINE ACCESS CONTROL BASED ON USERS SOCIAL NETWORK CONTEXT - System and method to control access by a user to an online service, the method including: receiving a request from a user to use an application; identifying, via a processor of a computing device, a social networking characteristic of the user; classifying the user based upon the social networking characteristic, to produce a classification of the user; and controlling an access to the online service based upon the classification of the user. The characteristic may be public or private. Controlling access may include permitting, impeding, or facilitating access. Display of a link may be changed, and/or the processing of the link if selected may be changed. Users may be classified at least as preferred, malicious, non-malicious, non-target and generic default. | 2014-02-06 |
20140041056 | SYSTEMS AND METHODS FOR MULTIPLE PHOTO FEE STORIES - In one embodiment, a method includes receiving a designation of one or more items of digital media; receiving a communication regarding the one or more items of digital media; associating the one or more items of digital media with the communication based on the designation; and setting a privacy level for the communication and the one or more items of digital media on a social-networking system based on a privacy setting of a user on the social-networking system. | 2014-02-06 |
20140041057 | DIGITAL DELIVERY SYSTEM AND USER INTERFACE FOR ENABLING THE DIGITAL DELIVERY OF MEDIA CONTENT - A system, method, and computer readable storage medium provide multi-platform accessibility of media content in a global computer network. Media content is selected in a client computer. Based on a format of the content, a media content player is loaded. If the content is not digital rights managements (DRM) protected, it is loaded and played in the player. If the content is DRM protected, a license to play the content is requested via an API and obtained via a server process. A web server computer creates/updates an authorized client user by communicating with a DRM server. The web server then creates a session with the DRM server and enables authorization to play by communicating with the DRM server that transmits the license to the client computer. Based on the license, the client loads and plays the content in the player. | 2014-02-06 |
20140041058 | METHODS AND APPARATUS FOR SHARING, TRANSFERRING AND REMOVING PREVIOUSLY OWNED DIGITAL MEDIA - The invention provide systems and methods for management of digital media objects, comprising first and second client digital data processors (e.g., personal (or private) computers, laptops, dedicated music devices, electronic book readers, and so forth) that are in communications coupling with one or more stores (e.g, dedicated disk drives, flash drives, cloud storage, etc.). At least one digital media object (DMO) or copy thereof is stored in one or more of those stores and is accessible by at least one of the first and second client digital data processors. | 2014-02-06 |
20140041059 | ANALYZING APPARATUS VALIDATING SYSTEM AND PROGRAM FOR THE SYSTEM - In validation of an analyzing apparatus, in the case where the system configuration is not standard or where a reference value required for the validation is different from a standard value, the validation work cannot be automatically performed, which requires time and effort. For a validation target analyzing apparatus system, first, a parameter acquiring unit acquires parameters for qualification implementation of the analyzing apparatus system on a basis of an electronically supplied qualification plan document and an electronically supplied qualification implementation procedure manual. Then, a validation executing unit executes validation of the analyzing apparatus system using the acquired parameters for qualification implementation. | 2014-02-06 |
20140041060 | Keypad Device - An example tamper detection mechanism may include an electrical pathway having a closed conductive configuration and being openable to prevent electrical conduction along the electrical pathway, and may further include detection circuitry connected to the electrical pathway and configured to detect a change in the resistance of the electrical pathway. The electrical pathway includes a pair of conductive pads electrically isolated from one another, and also includes a connector which in the closed conductive configuration contacts both conductive pads to form an electrical connection therebetween. The connector is moveable away from the pads to open the electrical connection for tamper detection. The connector has a resistor of predefined resistance which in the closed conductive configuration is included in the electrical pathway. The detection circuitry can distinguish, on the basis of the resistance of the electrical pathway, between connection of the pads by the connector and shorting between the two pads. | 2014-02-06 |
20140041061 | TAMPER PROTECTION DEVICE FOR PROTECTING A FIELD DEVICE AGAINST TAMPERING - The invention relates to a tamper protection device for protecting a field device against tampering, comprising a carrier and at least one electronic memory, wherein the at least one electronic memory is disposed in at least one partial area on the carrier, and the at least one electronic memory stores at least one predefinable security information item, and wherein the at least one electronic memory is designed in such a way as to modify the predefinable security information item in the event of at least partial damage to the tamper protection device. The invention further relates to a method for producing a field device having a tamper protection device, to a field device comprising a tamper protection device, to a tamper protection system, and to the use of a tamper protection device. | 2014-02-06 |
20140041062 | GENETICALLY ENGINEERED MOUSE MODEL FOR AUTISM SPECTRUM DISORDER HAVING DELETION OF SHANK2 GENE AND USE THEREOF - The present disclosure relates to an ASD genetically engineered model carrying a deletion of Shank2 gene and having reduced NMDA receptor function. According to the present disclosure, genetically engineered mice that show the clinical features of ASD due to the deletion of the Shank2 gene can be obtained, and the genetically engineered mice can be effectively used to screen candidate therapeutic agents. | 2014-02-06 |
20140041063 | Genetically Modified Rat Models for Obesity and Diabetes - This invention relates to a genetically modified or chimeric rat cell whose genome comprises chromosomal alleles of an obesity-diabetes gene (especially, the Mc4r gene or Lep gene), wherein at least one of the two alleles contains a mutation, or the progeny of this cell. The obesity or diabetes gene may affect any of the pathways of obesity and diabetes. The obesity or diabetes gene may predispose the rat to a phenotype of obese and diabetic, lean and diabetic, obese and non-diabetic, non-obese and diabetic or any of the combinations thereof. In another aspect, the invention relates to a desired rat or a rat cell which contains a predefined, specific and desired alteration rendering the rat or rat cell predisposed to obesity or diabetes. | 2014-02-06 |
20140041064 | COMPOSITIONS AND METHODS FOR IDENTIFYING VIRULENCE FACTORS AND ANTI-FUNGAL AGENTS - The present invention is based on the discovery of a two- or three-organism model system that can be used to identify virulence factors involved in fungal infection and to screen for agents that attenuate the activity of those factors. The system includes a model eukaryote, the nematode, | 2014-02-06 |
20140041065 | Animal Model of Central Neuropathic Pain and Methods of Making and Using the Same - The present disclosure describes an animal model of central neuropathic pain relevant to spinal cord injury, as well as methods of using the model to screen for therapeutic agents and to test existing therapies. | 2014-02-06 |
20140041066 | PRODUCTION OF FMDV-RESISTANT LIVESTOCK BY ALLELE SUBSTITUTION - A genetically modified livestock animal comprising a genomic modification to an eIF4G gene. Cells, genes, and proteins encompassing a protease-resistant eIF4G protein or gene. | 2014-02-06 |
20140041067 | ANTIBODIES, VARIABLE DOMAINS & CHAINS TAILORED FOR HUMAN USE - The invention relates to the provision of antibody therapeutics and prophylactics that are tailored specifically for human use. The present invention provides libraries, vertebrates and cells, such as transgenic mice or rats or transgenic mouse or rat cells. Furthermore, the invention relates to methods of using the vertebrates to isolate antibodies or nucleotide sequences encoding antibodies. Antibodies, heavy chains, polypeptides, nucleotide sequences, pharmaceutical compositions and uses are also provided by the invention. | 2014-02-06 |
20140041068 | Methods of Modifying Eukaryotic Cells - A method for engineering and utilizing large DNA vectors to target, via homologous recombination, and modify, in any desirable fashion, endogenous genes and chromosomal loci in eukaryotic cells. These large DNA targeting vectors for eukaryotic cells, termed LTVECs, are derived from fragments of cloned genomic DNA larger than those typically used by other approaches intended to perform homologous targeting in eukaryotic cells. Also provided is a rapid and convenient method of detecting eukaryotic cells in which the LTVEC has correctly targeted and modified the desired endogenous gene(s) or chromosomal locus (loci) as well as the use of these cells to generate organisms bearing the genetic modification. | 2014-02-06 |
20140041069 | TRUCHAS LETTUCE VARIETY - A new lettuce variety designated ‘Truchas’ is described. ‘Truchas’ is a grasse-type lettuce variety exhibiting stability and uniformity. | 2014-02-06 |
20140041070 | MEAD LETTUCE VARIETY - A new lettuce variety designated ‘Mead’ is described. ‘Mead’ is a crisp lettuce variety exhibiting stability and uniformity. | 2014-02-06 |
20140041071 | HYBRID CUCUMBER 'JURASSIC' - A new hybrid cucumber designated ‘Jurassic’ is described. ‘Jurassic’ is an oriental-type slicer cucumber that also has intermediate resistance to cucumber mosaic virus and cucumber vein yellowing virus. | 2014-02-06 |
20140041072 | CLONING AND EXPLOITATION OF A FUNCTIONAL R-GENE FROM SOLANUM X EDINENSE - The invention relates to a new resistance gene, Rpi-edn2 and functional homologues or functional fragments thereof isolated from S. x edinense. Moreover, the invention relates to the use of said resistance gene, for example the use of said resistance gene in a method to increase or confer at least partial resistance in a plant to an oomycete infection. The invention provides an isolated or recombinant nucleic acid sequence comprising a nucleic acid sequence encoding one of the amino acid sequences of FIG. | 2014-02-06 |
20140041073 | TRAIT IMPROVEMENT IN PLANTS EXPRESSING MYB-RELATED PROTEINS - Polynucleotides and polypeptides incorporated into expression vectors are introduced into plants and were ectopically expressed. These polypeptides may confer at least one regulatory activity and increased photosynthetic resource use efficiency, increased yield, greater vigor, greater biomass as compared to a control plant. | 2014-02-06 |
20140041074 | TOMATO HYBRID PX 02470002 AND PARENT LINES THEREOF - The invention provides seed and plants of tomato hybrid PX 02470002 and the parent lines thereof. The invention thus relates to the plants, seeds and tissue cultures of tomato hybrid PX 02470002 and the parent lines thereof, and to methods for producing a tomato plant produced by crossing such plants with themselves or with another tomato plant, such as a plant of another genotype. The invention further relates to seeds and plants produced by such crossing. The invention further relates to parts of such plants, including the fruit and gametes of such plants. | 2014-02-06 |
20140041075 | SOYBEAN TRANSGENIC EVENT MON 87708 AND METHODS OF USE THEREOF - The invention provides a transgenic soybean event MON 87708 plant and plants, plant cells, seeds, plant parts, and commodity products derived from event MON 87708. The invention also provides polynucleotides specific for event MON 87708 and plants, plant cells, seeds, plant parts, and commodity products comprising polynucleotides specific for event MON 87708. The invention also provides methods related to event MON 87708. | 2014-02-06 |
20140041076 | METABOLIC ENGINEERING OF PLANTS FOR INCREASED HOMOGENTISATE AND TOCOCHROMANOL PRODUCTION - The invention provides methods and compositions for modifying tocochromanol biosynthesis in plants. The present invention thus surprisingly and beneficially provides for increasing desired tocochromanol compounds in plants and enhancing the nutritional quality of human food and animal feed, without associate deleterious plant phenotypes. | 2014-02-06 |
20140041077 | Genetic Loci Associated with Fusarium Solani Tolerance in Soybean - The invention relates to methods and compositions for identifying soybean plants that are tolerant, have improved tolerance or are susceptible to | 2014-02-06 |
20140041078 | METHODS AND COMPOSITIONS FOR PRODUCING WATERMELON PLANTS WITH SELECTED SEED SIZES - The present disclosure provides for unique watermelon plants with a desired seed size phenotype and their progeny. Such plants may comprise an introgressed QTL associated with a desired seed size phenotype. In certain aspects, compositions, including distinct polymorphic molecular markers, and methods for producing, breeding, identifying, selecting, and the like of plants or germplasm with a desired seed size phenotype are provided. | 2014-02-06 |
20140041079 | GENETICALLY MODIFIED REDUCED-BROWNING FRUIT-PRODUCING PLANT AND PRODUCED FRUIT THEREOF, AND METHOD OF OBTAINING SUCH - A genetically modified fruit-producing plant, said plant having sufficiently reduced total Polyphenol Oxidase (PPO) activity relative to a wild type of said plant to reduce browning in the fruit of said plant relative to said wild type, wherein the reduced total PPO activity results from a reduction in activity of at least two PPO isoenzymes in said plant relative to said wild type, or a cell, seed, seedling, part, tissue, cell, fruit or progeny of said plant. | 2014-02-06 |
20140041080 | CHIMERIC PROMOTERS CAPABLE OF MEDIATING GENE EXPRESSION IN PLANTS UPON PATHOGEN INFECTION AND USES THEREOF - Described are synthetic promoters capable of mediating gene expression in plants upon pathogen infection. Furthermore, recombinant genes and vectors comprising said chimeric promoters as well as host cells transformed with such chimeric promoters, recombinant genes, or vectors are provided. Additionally, diagnostic compositions and kits comprising such chimeric promoters, recombinant genes, vectors or cells are described. Provided are further methods for the identification of compounds being capable of activating or inhibiting genes that are specifically expressed in plants upon pathogen infection employing the above described means. Furthermore, transgenic plant cells, plant tissue, and plants containing the above-described chimeric promoters, recombinant genes, and vectors as well as the use of the aforementioned chimeric promoters, recombinant genes, vectors and/or compounds identified by the method of the invention in plant cell and tissue culture, plant breeding, and/or agriculture are described. | 2014-02-06 |
20140041081 | MAIZE GENES FOR CONTROLLING PLANT GROWTH AND ORGAN SIZE AND THEIR USE IN IMPROVING CROP PLANTS - The present invention provides polynucleotides and related polypeptides of the ZmARGOS gene family. The invention provides genomic sequence for the ZmARGOS genes. ZmARGOS is responsible for controlling plant growth, organ size and yield in crop plants. | 2014-02-06 |
20140041082 | Manipulation of Ammonium Transporters (AMTs) to Improve NUE in Higher Plants - The present invention provides polynucleotides and related polypeptides of the protein AMT. The invention provides genomic sequence for the AMT gene. AMT is responsible for controlling nitrogen utilization efficiency in plants. | 2014-02-06 |
20140041083 | STACKED HERBICIDE TOLERANCE EVENT 8264.44.06.1, RELATED TRANSGENIC SOYBEAN LINES, AND DETECTION THEREOF - This invention relates in part to soybean event pDAB8264.44.06.1 and includes a novel expression cassettes and transgenic inserts comprising multiple traits conferring resistance to glyphosate, aryloxyalkanoate, and glufosinate herbicides. This invention also relates in part to methods of controlling resistant weeds, plant breeding and herbicide tolerant plants. In some embodiments, the event sequence can be “stacked” with other traits, including, for example, other herbicide tolerance gene(s) and/or insect-inhibitory proteins. This invention further relates in part to endpoint TaqMan PCR assays for the detection of Event pDAB8264.44.06.1 in soybeans and related plant material. Some embodiments can perform high throughput zygosity analysis of plant material and other embodiments can be used to uniquely identify the zygosity of and breed soybean lines comprising the event of the subject invention. Kits and conditions useful in conducting these assays are also provided. | 2014-02-06 |
20140041084 | Material Property Measurements Using Multiple Frequency Atomic Fore Microscopy - Apparatus and techniques for extracting information carried in higher eigenmodes or harmonics of an oscillating cantilever or other oscillating sensors in atomic force microscopy and related MEMs work are described. Similar apparatus and techniques for extracting information using contact resonance with multiple excitation signals are also described. | 2014-02-06 |
20140041085 | REAL SPACE MAPPING OF OXYGEN VACANCY DIFFUSION AND ELECTROCHEMICAL TRANSFORMATIONS BY HYSTERETIC CURRENT REVERSAL CURVE MEASUREMENTS - An excitation voltage biases an ionic conducting material sample over a nanoscale grid. The bias sweeps a modulated voltage with increasing maximal amplitudes. A current response is measured at grid locations. Current response reversal curves are mapped over maximal amplitudes of the bias cycles. Reversal curves are averaged over the grid for each bias cycle and mapped over maximal bias amplitudes for each bias cycle. Average reversal curve areas are mapped over maximal amplitudes of the bias cycles. Thresholds are determined for onset and ending of electrochemical activity. A predetermined number of bias sweeps may vary in frequency where each sweep has a constant number of cycles and reversal response curves may indicate ionic diffusion kinetics. | 2014-02-06 |
20140041086 | Mediterranean mandarin tree named 'ODEM' - A new and distinct mandarin variety of | 2014-02-06 |
20140041087 | BLACKBERRY PLANT NAMED 'EMILIA' - A new and distinct cultivar of Blackberry plant named ‘Emilia’ as described and shown herein. Distinctive characteristics of ‘Emilia’ include its earliness, thornless stems, large sized fruit and sweetness without bitter aftertaste. | 2014-02-06 |
20140041088 | Hemerocallis plant named 'Connie Marks' - A new and distinct cultivar of | 2014-02-06 |
20140041089 | Sedum plant named 'Pizzazz' - A new and distinct variety of | 2014-02-06 |
20140041090 | Variety of calla lily named 'Red Alert' - ‘Red Alert’ is a new variety of calla lily having flowers with a reddish orange-colored spathe that produces 2-7 flowers per tuber. The flower stems are between 20-30 cm. in height and the leaves are light green with whitish spots and have a leathery texture. | 2014-02-06 |