Patents - stay tuned to the technology

Inventors list

Assignees list

Classification tree browser

Top 100 Inventors

Top 100 Assignees


10th week of 2014 patent applcation highlights part 91
Patent application numberTitlePublished
20140068744Surrogate Secure Pairing of Devices - Methods and apparatuses for secure pairing are disclosed. In one example, a pairing surrogate is utilized to issue a pairing token to a first device and a second device to be paired.2014-03-06
20140068745CLIENT CREDENTIALS DATA STRUCTURE AND METHOD OF EMPLOYING THE SAME - A client credentials data structure, a method of employing the same and a secure client-server communication system employing the data structure or the method. One embodiment of the data structure is associated with a client and includes: (1) a pre-provisioned set of credentials configured to register the client with a server, (2) a standard user set of credentials employable for secure client-server communication, and (3) a re-acquisition token combinable with the pre-provisioned set of credentials to allow the client to re-register the client with the server.2014-03-06
20140068746METHOD FOR AUTHORIZING ACCESS TO PROTECTED CONTENT - The invention refers to a method for authorizing access to a third party application, called client (2014-03-06
20140068747Automatic Completeness Checks of Network Device Infrastructure Configurations During Enterprise Information Technology Transformation - Techniques for automatically determining configuration completeness during information technology (IT) transformation from a pre-transformation source environment to a post-transformation target environment. A method includes obtaining a record of each of multiple data flows in a source environment, transforming each data flow in the source environment to a transformed data flow that corresponds to a target environment, and automatically determining that each of the transformed data flows is covered by a firewall configuration of one or more interfaces in the target environment.2014-03-06
20140068748DIAMETER FIREWALL USING RECEPTION IP ADDRESS OR PEER IDENTITY - Various exemplary embodiments relate to a method performed by a DIAMETER network node, the method including: receiving a first DIAMETER message; determining that the first DIAMETER message is not trusted; and rejecting the first DIAMETER message.2014-03-06
20140068749SYSTEMS AND METHODS FOR UPDATING CONTENT DETECTION DEVICES AND SYSTEMS - Systems, methods, and software for processing received network traffic content in view of content detection data and configuration data to either block, permit, or to further evaluate network traffic content when entering a network.2014-03-06
20140068750ESTABLISHING AN IPSEC (INTERNET PROTOCOL SECURITY) VPN (VIRTUAL PRIVATE NETWORK) TUNNEL - Systems, methods and apparatuses of establishing an IPsec (Internet Protocol Security) VPN (Virtual Private Network) tunnel are disclosed. One method includes receiving, by a wireless mesh network access point, a user configuration, wherein the user configuration includes a type of traffic, determining an internal interface of the wireless mesh network access node based on the type of traffic, dynamically determining a local endpoint address for the IPsec VPN tunnel based on the selected internal interface, and establishing the IPsec VPN tunnel through the selected internal interface of the wireless mesh network access node.2014-03-06
20140068751AUTOMATED DEVICE ACCESS - A method of unlocking a locked device includes receiving a device identifier over a wireless communication protocol, determining if the device identifier is associated with a list of trusted devices, transmitting a request to generate an acoustic signal over the wireless communication protocol based on the determination, receiving the acoustic signal as an audio sound generated external to the locked device, estimating a distance between a source of the audio sound and the locked device, and unlocking the locked device based on the estimation.2014-03-06
20140068752ELECTRONIC DEVICE FOR RELEASING LOCK FUNCTION USING A PLURALITY OF OBJECTS AND METHOD THEREOF - An apparatus and method for sensing an input for releasing a predetermined lock function of an electronic device is provided. The method includes setting at least two or more objects for releasing the lock function, outputting an object group including the set objects and an object group including certain objects on a lock screen, allowing a user to select at least two or more objects in the output object groups, and releasing the lock function when the selected objects are identical to previously defined objects.2014-03-06
20140068753Access Arbitration Module and System for Semiconductor Fabrication Equipment and Methods for Using and Operating the Same - An access arbitration module includes a plurality of active component communication ports for communicating with a plurality of active components, and includes a passive component communication port for communicating with a passive component. The access arbitration module also includes switching logic defined to control transmission of access communication protocol signals between each of the plurality of active component communication ports and the passive component communication port, such that an authorized one of the plurality of active component communication ports is connected in communication with the passive component communication port at a given time, and such that non-authorized ones of the plurality of active component communication ports are prevented from communication with the passive component communication port at the given time.2014-03-06
20140068754PASSWORD GENERATION AND RECALL - The invention provides the ability to produce long, complex passwords from simple, easy to recall, pictorial selections. The invention features a picture based interface unit, linked to a series of individual process modules. Selecting images contained in the image selection module generates a reference pointer corresponding to coordinates in the reference pointer of the control module which thereby generates a rotor sequence that is passed to the password generator module containing ASCII characters groups. The character groups are processed according to the rotor sequence contents to produce a password that is displayed in a display module for editing and/or use.2014-03-06
20140068755MOBILE DEVICE CHILD SHARE - In embodiments of mobile device child share, a mobile device can display a default device lock screen on an integrated display device, and receive an input effective to transition from the default device lock screen to display a child lock screen without receiving a PIN code entered on the default device lock screen. The mobile device can receive a second input effective to transition from the child lock screen to display a child space. The mobile device implements a device share service that activates a child share mode of the mobile device, and restricts functionality of device applications and access to device content based on designated restriction limits.2014-03-06
20140068756SYSTEMS AND METHODS FOR CHALLENGE-RESPONSE ANIMATION AND RANDOMIZATION TESTING - Systems and methods are provided for challenge/response animation. In one implementation, a request for protected content may be received from a client, and the protected content may comprise data. A challenge phrase comprising a plurality of characters may be determined, and a computer processor may divide the challenge phrase into at least two character subsets selected from the characters comprising the challenge phrase. Each of the at least two character subsets may include less than all of the characters comprising the challenge phrase. The at least two character subsets may be sent to the client in response to the request; and an answer to the challenge phrase may be received from the client in response to the at least two character subsets. Access to the protected content may be limited based on whether the answer correctly solves the challenge phrase.2014-03-06
20140068757AUTHENTICATION DEVICE, AUTHENTICATION METHOD, AND RECORDING MEDIUM - An authentication device includes an authentication unit configured to determine whether an input password input to a input unit matches a registered password registered in advance in a storage unit, count the number of times it is determined that the input password does not match the registered password, and stops authentication using a password if the number of times a mismatch is determined reaches a specified number, and a management unit configured to create an input error list supporting each of characters, digits, or other elements included in the registered password, on the basis of a history of errors of input to the input unit, and configured to cancel counting in a case where it is determined by the authentication unit that the input password does not match the registered password and a cause of the mismatch lies in an input error included in the input error list.2014-03-06
20140068758Method and System of Simulating a Pulse Generator on a Clinician Programmer - The present disclosure involves a method of simulating a pulse generator on a portable electronic device. A graphical user interface is provided via a touch-sensitive screen of the portable electronic device. The graphical user interface is configured to facilitate interactive user engagements with the portable electronic device. A pulse generator simulator is launched on the portable electronic device in response to a request from the user. The pulse generator simulator provides a virtual pulse generator that duplicates a plurality of functionalities and features of an actual pulse generator. The virtual pulse generator is programmed based on user input received via the graphical user interface. One or more statuses of the virtual pulse generator are then displayed via the graphical user interface.2014-03-06
20140068759Secure Connected Digital Media Platform - An embodiment of the invention provides a system including a secure media device having one or more security keys stored therein. The secure media device is housed in a device that is connected to a television unit and a network. Secure application environments are housed in the device, wherein each secure application environment is operationally isolated from one another. The secure application environments receive and process information sent over the network only if the information includes a security code corresponding to the security key in the secure media device. The security code is obtained from a clearinghouse when the information satisfies predetermined criteria. More specifically, the clearinghouse receives a copy of the security key from a manufacturer of the secure media device and creates the security code based on the security key.2014-03-06
20140068760Method, System and Computer Storage Medium for Rights Management - A method, system and non-transitory computer storage readable medium for rights management are disclosed. The method for rights management includes the following steps: acquiring operation requests; querying from a pre-created rights list according to the operation request, and returning the corresponding processing result; and executing a corresponding operation according to the processing result. According to the above method, system and non-transitory computer readable storage medium for rights management, the corresponding processing result is obtained by querying from the pre-created rights list according to an operation request, and a corresponding operation is performed according to the processing result, without classification management of various resources or various operations, instead using the unified management, which reduces the complexity of rights management and improves the convenience of management.2014-03-06
20140068761ABUSE IDENTIFICATION OF FRONT-END BASED SERVICES - Systems and techniques of monitoring, detecting and handling abusive client behavior among data communication to and from a server system is presented. In one embodiment, a method for detecting and handling abusive client comprises: monitoring communications traffic between said server and said client; testing said traffic for abusive activity substantially in real-time; and if abusive activity has been detected, taking action against said abusive activity within a desired time period. In another embodiment, a server system comprises: a capture module that captures data between said server and a client; a package module that packages the said captured data; an analyze data module that detects abusive activity within said captured data; and a recommendations and/or actions module to perform actions in response to said abusive activity.2014-03-06
20140068762DETECTION ARRANGEMENT - There is provided a detection arrangement for detecting an attack to internal signals in a semiconductor device. The detection arrangement comprises a first input terminal, a second input terminal, and a comparison unit. The first input terminal is adapted to receive a first signal being indicative for a signal at a first stage of a driver of the semiconductor device, the driver being capable to drive signals internally to the semiconductor device. The second input terminal is adapted to receive a second signal being indicative for a signal at a second stage of the driver of the semiconductor device. The comparison unit is adapted to compare the first signal and the second signal and to determine a time period during which the signals are equal, wherein the determined time period is indicative for a potential attack, if the determined time period is above a predefined threshold.2014-03-06
20140068763DATA MINING TO IDENTIFY MALICIOUS ACTIVITY - Systems and methods may determine suspicious network traffic. A monitoring system comprising a processor in communication with a network may monitor network traffic to or from an asset associated with the network. The monitoring system may assess the network traffic to determine a source and/or destination for the network traffic anchor content of the network traffic. The monitoring system may determine whether the network traffic is suspicious network traffic based on the assessed source and/or destination and/or content. When the network traffic is determined to be suspicious network traffic, the monitoring system may capture metadata associated with the suspicious network traffic and store the metadata in a database in communication with the processor. When the network traffic is not determined to be suspicious network traffic, the monitoring system may disregard metadata associated with the network traffic.2014-03-06
20140068764METHOD AND SYSTEM FOR PERFORMING SECURITY MONITORING ON FILE DOWNLOADING - The present invention discloses method and system for performing security monitoring on file downloading, and a non-transitory computer-readable medium that stores instructions for performing security monitoring on file downloading. The method includes upon detecting a file downloading operation, performing security detection on a downloaded file to determine whether the downloaded file is secure; if the downloaded file is secure, determining whether a downloading tool adopted when the file is downloaded is instant messenger (IM) software; and if the adopted downloading tool is IM software, modifying a filename extension of the downloaded file to ensure that the downloaded file is capable of being directly opened or run.2014-03-06
20140068765METHOD AND APPARATUS FOR AUTHENTICATING USER IN MULTIPARTY QUANTUM COMMUNICATIONS - the present invention provides a method for authenticating a user in a multiparty quantum communication comprising: generating l quantum entangled states with N particles and transmitting each particle of the l quantum entangled states to N users, by a quantum communication server, wherein the N is a natural number larger than 2; determining, by the quantum communication server, whether a disguised attacker exists among N users on the basis of a first error rate calculated by using n quantum states randomly selected from the l quantum states possessed by the users respectively and a previously shared secret key in each of the users; and controlling, by the quantum communication server, each of the users to generate a new secret key using m2014-03-06
20140068766Secure Code Verification Enforcement In A Trusted Computing Device - Secure code verification enforcement in a trusted computing device, including: examining, by a secure code validation module, a trusted computing device that is locked in a powered down state in response to an impermissible physical access of the trusted computing device; determining, by the secure code validation module, whether content of trusted memory in the trusted computing device has been altered; and responsive to determining that the content of trusted memory in the trusted computing device has not been altered, unlocking, by the secure code validation module, the trusted computing device such that the trusted computing device can be powered up.2014-03-06
20140068767SYSTEMS AND METHODS FOR DETECTING ILLEGITIMATE APPLICATIONS - A computer-implemented method for detecting illegitimate applications may include 1) identifying an installation of an application on a computing system, 2) determining, in response to identifying the installation of the application, that at least one system file with privileged access on the computing system has changed prior to the installation of the application, 3) determining that the application is illegitimate based at least in part on a time of the installation of the application relative to a time of a change to the system file, and 4) performing a remediation action on the application in response to determining that the application is illegitimate. Various other methods, systems, and computer-readable media are also disclosed.2014-03-06
20140068768Apparatus and Method for Identifying Related Code Variants in Binaries - An apparatus for identifying related code variants may include processing circuitry configured to execute instructions for receiving query binary code, processing the query binary code to generate one or more query code fingerprints comprising compressed representations of respective functional components of the query binary code, comparing the one or more query code fingerprints to at least some reference code fingerprints stored in a database to determine a similarity measure between the one or more query code fingerprints and at least some of the reference code fingerprints, and preparing at least one report based on the similarity measure.2014-03-06
20140068769USING NEW EDGES FOR ANOMALY DETECTION IN COMPUTER NETWORKS - Creation of new edges in a network may be used as an indication of a potential attack on the network. Historical data of a frequency with which nodes in a network create and receive new edges may be analyzed. Baseline models of behavior among the edges in the network may be established based on the analysis of the historical data. A new edge that deviates from a respective baseline model by more than a predetermined threshold during a time window may be detected. The new edge may be flagged as potentially anomalous when the deviation from the respective baseline model is detected. Probabilities for both new and existing edges may be obtained for all edges in a path or other subgraph. The probabilities may then be combined to obtain a score for the path or other subgraph. A threshold may be obtained by calculating an empirical distribution of the scores under historical conditions.2014-03-06
20140068770Enhanced Security and Safety in Telerobotic Systems - Methods and systems for securing remotely-operable devices are provided. A security device can receive a plurality of commands to control a remotely-operable device in a remote environment. At least one command in the plurality of commands can include command data that is related to the remotely-operable device. The security device can receive a plurality of responses to the plurality of commands. The security device can process the plurality of commands and the plurality of responses to determine a signature related to an operator that issued the plurality of commands for the remotely-operable device. The security device can determine an identity of the operator based on the signature. The security device can generate an identity report that includes the identity of the operator.2014-03-06
20140068771Transforming User-Input Data in Scripting Language - A mechanism for preventing injection attacks of scripting languages is provided. There is a mechanism of transforming user-input data in a scripting language included. The mechanism comprises a step of tracing a script instruction to separate instruction related variables and user-input related, variables; and a step of encoding the user-input related variables into data belonging to safe-character-set area which do not include reserved character, and passing the encoded user-input related variables to a statement of the script instruction.2014-03-06
20140068772Fuzzy Whitelisting Anti-Malware Systems and Methods - In some embodiments, an anti-malware system accounts for benign differences between non-malicious data objects, such as differences introduced by compilers and other polymorphisms. A target object is separated into a multitude of code blocks, and a hash is calculated for each code block. The obtained set of target hashes is then compared against a database of hashes corresponding to code blocks extracted from whitelisted objects. A target object may be labeled as whitelisted (trusted, non-malicious) if it has a substantial number of hashes in common with a whitelisted object. Objects which are slightly different from known whitelisted objects may still receive whitelisting status. By allowing a certain degree of mismatch between the sets of hashes of distinct objects, some embodiments of the present invention increase the efficiency of whitelisting without an unacceptable decrease in safety.2014-03-06
20140068773METHODS, SYSTEMS AND MEDIA FOR DETECTING NON-INTENDED TRAFFIC USING CO-VISITATION INFORMATION - A non-transitory processor-readable medium stores code representing instructions to be executed by a processor to receive data associated with access by a first plurality of entities to a first website location and to receive data associated with access by a second plurality of entities to a second website location. The processor is also caused to define a co-visitation factor for each of the first website location and the second website location based on the received data. The processor is also caused to, if the co-visitation factor of the first website location and/or the co-visitation factor of the second website location is over a predefined threshold, select the first website location and/or the second website location as target website locations. The processor is caused to send a signal to set a flag associated with each target website location indicating the target website location as a suspicious website location.2014-03-06
20140068774DETECTING A MALWARE PROCESS - Detecting a malware process is disclosed, including: monitoring a launch of a process; in response to a completion of the launch of the process, determining a base address associated with the process; determining a permission of a memory block associated with the base address; and determining whether the process is potentially associated with a malware process based at least in part on the determined permission.2014-03-06
20140068775HISTORICAL ANALYSIS TO IDENTIFY MALICIOUS ACTIVITY - Systems and methods may use historical analysis to identify malicious activity. A discovery/recovery system may comprise a processor in communication with a network and in communication with a database. The discovery/recovery system may gather filtered historical network data associated with an asset associated with the network. The discovery/recovery system may analyze the filtered historical network data to determine whether a subset of the filtered historical network data is associated with a malware infection of the asset.2014-03-06
20140068776USER INTERFACE HIJACKING PREVENTION DEVICE AND METHOD - This discloses a device for preventing a user interface from being hijacked. The device can include: an information collecting module that collects information regarding a scheduled task; a monitoring module that monitors the scheduled task in accordance with the collected information to obtain a running status of the scheduled task and generates a control command in accordance with the running status; a user operation obtaining module that obtains a user operation after the monitoring module issues the control command; a window constructing module that constructs a window in accordance with the control command issued by the monitoring module and/or the user operation obtained by the user operation obtaining module; and a message generating module that generates a message and transmits the message to the window constructing module to display the message in the window. This also discloses a method of preventing a user interface from being hijacked.2014-03-06
20140068777METHOD AND SYSTEM FOR DETECTING ANAMOLIES WITHIN VOLUMINOUS PRIVATE DATA - A method and a system for detecting anomalies within a voluminous private data are provided. The voluminous private data, including sensitive information corresponding to one or more objects within the voluminous private data is received. The sensitive information within the voluminous private data is identified, and identified sensitive information is modified to generate a modified voluminous private data. The sensitive information is marked in the modified voluminous private data to generate a marked voluminous private data. The anomaly within the marked voluminous private data is detected.2014-03-06
20140068778SECURING DATABASES AGAINST PIRACY ATTACKS - A database for location or geographic based services is secured by requiring location based requests to include a unique identifier that identifies the location as well as an authorization identifier associated with the location. The authorization identifier is information that is obtained by being physically present at the location, such as information from access points that are at the location or a position fix when present at the location. The authorization identifier may be non-unique but relatively time-invariant, making such information easily crowdsourced, but difficult to obtain unless physically present at the location. For example, the authorization identifier may be an SSID or a Beacon Frame, or a hash thereof from one or more devices at the location or a position fix.2014-03-06
20140068779SYSTEM AND METHOD FOR CREATING A SECURE CHANNEL FOR INTER-APPLICATION COMMUNICATION BASED ON INTENTS - System and method for creating a secure channel for inter-application communication based on the messaging system called Intents in the Android OS are disclosed. In one embodiment, an application for accessing a cloud-based storage platform triggers the broadcast of a custom Intent to all applications on a mobile device to detect an authorized application that is capable of interacting with the application. Once an authorized application is chosen, the application opens a secure channel for communication with the authorized application and passes encrypted data stream to the to the secure channel for access by the authorized application.2014-03-06
20140068780APPARATUS AND METHOD FOR REMOTELY DELETING CRITICAL INFORMATION - An apparatus and method for remotely deleting critical information is provided. The apparatus includes a storage unit, an identity determination unit, and a broadcast unit. The storage unit stores an input value and an output value for the input value with respect to a physically unclonable function (PUF) of each of a plurality of mobile terminals. The identity determination unit determines the identity of a corresponding mobile terminal based on received information about the loss of the mobile terminal. The broadcast unit extracts the input and output values of the PUF of the corresponding mobile terminal from the storage unit based on information transferred from the identity determination unit, and broadcasts the extracted input and output values to all the mobile terminals.2014-03-06
20140068781LOCATION-BASED RECOVERY DEVICE AND RISK MANAGEMENT SYSTEM FOR PORTABLE COMPUTING DEVICES AND DATA - A device and software utilizing Global Positioning Satellite (GPS) technologies for monitoring and recovering portable computing devices and, a method and system for acquiring such devices, protecting data on such devices, and for compensating owners of devices. A GPS mechanism of the invention provides real time tracking of missing devices that may be coordinated with security agencies to intercept and recover missing computing devices. When a stolen device is unrecoverable, the invention may receive a signal to initiate data recovery where a wireless network is available to recover data for the owner. Alternatively, the GPS mechanism instructs the device to encrypt or destroy stored data files to prevent commercial espionage or privacy violations. The invention discloses a software system and method for computing a purchase price of the GPS mechanism, computing compensation for loss of the device and lost data.2014-03-06
20140068782Persona-Notitia Intellection Codifier - A persona-notitia intellection codifier (P-NIC) server intelligently codifies and disburses personal user information from a user device (smartphone, laptop, etc.) to a multiplicity of designee devices. Masking Persona-Notitia Intellection Codes (a.k.a. PICs) are created that each stipulate control(s) and parametric limitation(s) for the associated one of a variety of personal user information. The Persona-Notitia Intellection Codifier (P-NIC) server rapidly produces a mask comprising a multiple bit “key” value (i.e., a persona-notitia intellection code (PIC)) that is uniquely distinguishable from every other PIC that's ever been generated for a given user. The value of the PIC is typically many bytes in length, and associates attributes to a unique key value that describes a desired subset of all the user's available personal user information to be unlocked by the key value (i.e., by the PIC).2014-03-06
20140068783DYNAMIC SELECTION OF AUTHORIZATION PROCESSES - Systems, methods, and software are disclosed herein for licensing applications using a preferred authorization process dynamically identified based on conditions associated with an initiation of an application. Authorization is then attempted using the preferred authorization process. In some examples, the preferred authorization process is selected from at least a keyless authorization process and a key-based authorization process.2014-03-06
20140068784SYSTEM AND METHOD FOR DYNAMIC SECURITY PROVISIONING OF COMPUTING RESOURCES - The present invention facilitates the dynamic provisioning of computing and data assets in a commodity computing environment. The invention provides a system and method for dynamically provisioning and de-provisioning computing resources based on multi-dimensional decision criteria. By employing specialized computing components configured to assess an asset and requestor of an asset, a provisioning engine is able to transform the input from the computing components into a specific configuration of computing resource provisioning and security controls. According to the rules and policies applying to a security domain, the provisioning engine may dynamically allocate computing resources in a manner that is both safe and efficient for the asset.2014-03-06
20140068785AUDITING ELECTRONIC DEVICES FOR CUSTOMER PERSONAL INFORMATION - A system, method, and auditing device for processing electronic devices to detect CPI. The auditing device may include a user interface for communicating information and receiving user input. The auditing device may also include a number of interfaces operable to communicate with the one or more electronic devices. The auditing device may also include a memory operable to store a plurality of libraries providing information for detecting CPI on a number of electronic devices including a number of makes, models, and configurations. The auditing device may also include logic operable to utilize the plurality of libraries to detect CPI included on the one or more electronic devices communicating with the testing device, record an identification of an electronic device in response to detecting the CPI is present on the electronic device, and store an alert associated with the identification indicating that CPI is present on the electronic device.2014-03-06
20140068786Securing Operating System/Web Server Systems and Methods - Systems and methods for securely operating web servers, operating systems, etc. Methods of embodiments include creating virtual roots for executive jails and corresponding administrative jails within parent operating systems. Embodiments also include setting privileges associated with each of the executive jails to disk read-only. Moreover, administrative jails are hidden from executive jails and the parent operating system is hidden from both sets of jails. Also, the methods include cross mounting user configuration information and/or applications from the administrative jails and in to the corresponding executive jails. Methods can include password protecting the administrative jails and/or restricting the executive jails from initiating outbound communications. Methods can also include storing security related syslog data in locations associated with parent file structure of the parent operating systems. Methods can also include storing web log related syslog data in locations associated with the administrative jails thereby providing, as desired, compliance/auditing reporting functions.2014-03-06
20140068787INSTANT ACCOUNT ACCESS AFTER REGISTRATION - A method for user registration may include in response to receiving registration data of the user from a client, creating an inactivated user account, generating a temporary session that includes a temporary session identification, transmitting the temporary session identification to the client, and subsequent to the transmitting the temporary session identification, sending an e-mail containing a hyperlink for verification to the user.2014-03-06
20140068788INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING METHOD, PROGRAM AND CLIENT TERMINAL - There is provided an information processing apparatus including a processing request acquisition unit configured to sequentially acquire a plurality of processing requests from a user, and an authentication execution unit configured to distribute and execute user authentication processing according to a timing of acquiring the plurality of processing requests.2014-03-06
20140068789Wireless Media Streaming System - While a stream device is streaming a media program from a multimedia device to a client device, the streaming device may be configured to send a first portion of the media program to the client device, where the first portion is transcoded from a first format into a second different format and adapted for a first playing mode of the client device. The streaming device may be configured to receive an indication of a user command from the client device specifying a second different playing mode of the client device. The streaming device may be configured to send a second different portion of the media program to the client device, where the second portion is transcoded from the first format to the second format and adapted for the second playing mode of the client device.2014-03-06
20140068790Methods, Systems, And Computer Program Products For Media-Based Authentication - A method for generating an input key for authenticating access to a resource, the method including obtaining an input media; determining a reference point in the input media; sampling the input media in response to determining the reference point to define an input media sample; generating cell data from the input media sample; and generating the input key using the cell data.2014-03-06
20140068791SECURELY STORING DATA IN A DISPERSED STORAGE NETWORK - A method to securely store a data file in a dispersed storage network (DSN) in a manner to increase difficulty in hacking the data file begins by a dispersed storage (DS) processing module encoding the data file into a plurality of data portions. The method continues with the DS processing module dispersed storage error encoding a first data portion to produce a set of encoded data slices, generating a set of DSN addresses, and sending the set of encoded data slices to a first set of storage units using the set of DSN addresses. The method continues with the DS processing module dispersed storage error encoding a second data portion to produce a second set of encoded data slices, generating a second set of DSN addresses, and sending the second set of encoded data slices to a second set of storage units using the second set of DSN addresses.2014-03-06
20140068792INFORMATION PROCESSING APPARATUS AND CONTROL METHOD - An information processing apparatus is capable of performing a plurality of processes in parallel, and includes a plurality of operation components each including individual components, which are provided for respective processes to be performed in parallel. A control unit permits activation of as many operation components as the number of right-to-use licenses, out of the operation components. When detecting an abnormality in an individual component included in an active operation component, the control unit deactivates the other individual components of the operation component including the abnormal individual component, and activates another inactive operation component.2014-03-06
20140068793TRANSCOBALAMIN RECEPTOR POLYPEPTIDES, NUCLEIC ACIDS, AND MODULATORS THEREOF, AND RELATED METHODS OF USE IN MODULATING CELL GROWTH AND TREATING CANCER AND COBALAMIN DEFICIENCY - The present invention provides the amino acid and polynucleotide sequences of the transcobalamin receptor, as well as modulators of the transcobalamin receptor. Accordingly, the present invention provides compositions and methods for the treatment and prevention of diseases and disorders associated with cobalamin deficiency, including compositions and methods that promote cobalamin uptake. In addition, the present invention provides compositions and methods for the detection, treatment, and prevention of diseases associated with deregulated cell growth, including, e.g., cancer and autoimmune disorders, including compositions and methods that inhibit cobalamin uptake.2014-03-06
20140068794R2R1/2 In Diagnosis and Therapy - The present invention stems from the finding that two genes designated R2R2014-03-06
20140068795Methods for Genetic Diversification in Gene Conversion Active Cells - The invention relates to a modified lymphoid cell having gene conversion fully or partially replaced by hypermutation, wherein said cell has no deleterious mutations in genes encoding paralogues and analogues of the RAD51 protein, and wherein said cell is capable of directed and selective genetic diversification of a target nucleic acid by hypermutation or a combination of hypermutation and gene conversion. The invention also relates to a method for diversifying any transgenic target gene in said cell. Preferably, the target gene is integrated into the immunoglobulin light or heavy chain locus by targeted integration.2014-03-06
20140068796TRANSGENIC ANIMAL FOR PRODUCTION OF ANTIBODIES HAVING MINIMAL CDRS - A transgenic animal is provided. In certain embodiments, the transgenic animal comprises a genome comprising: an immunoglobulin light chain locus comprising: a) a functional immunoglobulin light chain gene comprising a transcribed variable region encoding: i. light chain CDR1, CDR2 and CDR3 regions that are composed of 2 to 5 different amino acids; and ii. a light chain framework; and, operably linked to the functional immunoglobulin light chain gene: b) a plurality of pseudogene light chain variable regions each encoding: i. light chain CDR1, CDR2 and CDR3 regions that are composed of the same 2 to 5 different amino acids as the CDRs of the functional gene; and ii. a light chain framework that is identical in amino acid sequence to the light chain framework of the transcribed variable region.2014-03-06
20140068797METHODS AND COMPOSITIONS FOR RNA-DIRECTED TARGET DNA MODIFICATION AND FOR RNA-DIRECTED MODULATION OF TRANSCRIPTION - The present disclosure provides a DNA-targeting RNA that comprises a targeting sequence and, together with a modifying polypeptide, provides for site-specific modification of a target DNA and/or a polypeptide associated with the target DNA. The present disclosure further provides site-specific modifying polypeptides. The present disclosure further provides methods of site-specific modification of a target DNA and/or a polypeptide associated with the target DNA The present disclosure provides methods of modulating transcription of a target nucleic acid in a target cell, generally involving contacting the target nucleic acid with an enzymatically inactive Cas9 polypeptide and a DNA-targeting RNA. Kits and compositions for carrying out the methods are also provided. The present disclosure provides genetically modified cells that produce Cas9; and Cas9 transgenic non-human multicellular organisms.2014-03-06
20140068798Multi-Seed Mutant of Sorghum for Increasing Grain Yield - Stable and heritable 2014-03-06
20140068799HYBRID SPINACH VARIETY 51-336 RZ - The present invention relates to a 2014-03-06
20140068800HYBRID SPINACH VARIETY 51-706 RZ - The present invention relates to a 2014-03-06
20140068801HYBRID SPINACH VARIETY 51-331 RZ - The present invention relates to a 2014-03-06
20140068802Rice Cultivar Designated 'CL131' - A novel rice cultivar, designated ‘CL131,’ is disclosed. The invention relates to the seeds of rice cultivar ‘CL131,’ to the plants of rice ‘CL131,’ and to methods for producing a rice plant produced by crossing the cultivar ‘CL131’ with itself or another rice variety, and to single gene conversions of such plants. The invention further relates to hybrid rice seeds and plants produced by crossing the cultivar ‘CL131’ with another rice cultivar. The invention further relates to other derivatives of the cultivar ‘CL131.’2014-03-06
20140068803HYBRID SPINACH VARIETY 51-337 RZ - The present invention relates to a 2014-03-06
20140068804HYBRID SPINACH VARIETY 51-707 RZ - The present invention relates to a 2014-03-06
20140068805HYBRID SPINACH VARIETY 51-332 RZ - The present invention relates to a 2014-03-06
20140068806HYBRID SPINACH VARIETY 51-333 RZ - The present invention relates to a 2014-03-06
20140068807DIRIGENT GENE EG261 AND ITS ORTHOLOGS AND PARALOGS AND THEIR USES FOR PATHOGEN RESISTANCE IN PLANTS - The present invention provides the identification and use of EG261, homologs of EG261, orthologs of EG261, paralogs of EG261, and fragments and variations thereof for altering, e.g. increasing, pathogen tolerance and/or resistance in plants.2014-03-06
20140068808Variety Corn Line ID3517 - The present invention provides an inbred corn line designated ID3517, methods for producing a corn plant by crossing plants of the inbred line ID3517 with plants of another corn plant. The invention further encompasses all parts of inbred corn line ID3517, including culturable cells. Additionally provided herein are methods for introducing transgenes into inbred corn line ID3517, and plants produced according to these methods.2014-03-06
20140068809STRESS RESPONSIVE EXPRESSION - The present invention relates to the identification of transcriptional control sequences that are active in plants in response to stress. Accordingly, methods for effecting stress responsive expression of a nucleotide sequence of interest in a plant are provided, the methods including expressing the nucleotide sequence of interest operably connected to a transcriptional control sequence which is stress inducible in the plant, wherein the nucleotide sequence of interest is heterologous with respect to the transcriptional control sequence. Also provided are nucleic acid constructs including the stress inducible transcriptional control sequences, genetically modified cells including the nucleic acid constructs, and multicellular structures including one or more of the genetically modified cells.2014-03-06
20140068810USE OF ALDH7 FOR IMPROVED STRESS TOLERANCE - The present invention relates to the field of plant molecular biology, more particularly to the regulation of genes that increase drought tolerance and yield. Provided herein are methods finding use in agriculture for increasing drought tolerance in dicot and monocot plants. Methods comprise introducing into a plant cell a polynucleotide that encodes an ALDH7 polypeptide operably linked to a promoter that drives expression in a plant. Also provided are transformed plants, plant tissues, plant cells, and seeds thereof.2014-03-06
20140068811DROUGHT TOLERANT PLANTS AND RELATED CONSTRUCTS AND METHODS INVOLVING GENES ENCODING ZINC-FINGER (C3HC4-TYPE RING FINGER) FAMILY POLYPEPTIDES - Isolated polynucleotides and polypeptides and recombinant DNA constructs useful for conferring drought tolerance, compositions (such as plants or seeds) comprising these recombinant DNA constructs, and methods utilizing these recombinant DNA constructs. The recombinant DNA construct comprises a polynucleotide operably linked to a promoter that is functional in a plant, wherein said polynucleotide encodes a Zinc-Finger (C3HC4-type RING finger) family polypeptide.2014-03-06
20140068812REGULATORY SEQUENCES TO CONTROL GENE EXPRESSION IN PLANTS - The present invention discloses regulatory sequences, promoters and terminators, and their use in plants. The regulatory sequences can be used to make gene constructs that include a gene not natively associated with the regulatory sequences. Methods to use the regulatory sequences with antisense constructs or functional RNAs are disclosed. Methods to use the regulatory sequences, promoter or terminator, independently of each other are also disclosed. Methods to use the regulatory sequences to improve plant growth and production such as increased biomass, increased yield and increased tolerance to abiotic or biotic stresses are also disclosed.2014-03-06
20140068813CHIMERIC PROMOTERS CAPABLE OF MEDIATING GENE EXPRESSION IN PLANTS UPON PATHOGEN INFECTION AND USES THEREOF - Described are synthetic promoters capable of mediating gene expression in plants upon pathogen infection. Furthermore, recombinant genes and vectors comprising said chimeric promoters as well as host cells transformed with such chimeric promoters, recombinant genes, or vectors are provided. Additionally, diagnostic compositions and kits comprising such chimeric promoters, recombinant genes, vectors or cells are described. Provided are further methods for the identification of compounds being capable of activating or inhibiting genes that are specifically expressed in plants upon pathogen infection employing the above described means. Furthermore, transgenic plant cells, plant tissue, and plants containing the above-described chimeric promoters, recombinant genes, and vectors as well as the use of the aforementioned chimeric promoters, recombinant genes, vectors and/or compounds identified by the method of the invention in plant cell and tissue culture, plant breeding, and/or agriculture are described.2014-03-06
20140068814METHOD OF IMPROVING ABIOTIC STRESS TOLERANCE OF PLANTS AND PLANTS GENERATED THEREBY - A method of improving abiotic stress tolerance of a plant is provided. The method comprising genetically modifying the plant to express miRNA167 in an abiotic stress responsive manner, wherein a level of expression of total miR167 under the abiotic stress conditions is selected not exceeding 10 fold compared to same in the plant when grown under optimal conditions, thereby improving abiotic stress tolerance of the plant.2014-03-06
20140068815Sorghum Maturity Gene and Uses Thereof in Modulating Photoperiod Sensitivity - Compositions relating to the sorghum maturity gene 1 (Ma1) and expression control sequences and methods of use thereof are provided. The compositions can be used to modulate flowering and photoperiod sensitivity in a plant. For example, methods are provided for developing genetically modified plant varieties in which flowering is accelerated, delayed or prevented. Methods are provided for treating a plant in order to delay flowering in the plant. Methods of placing a polynucleotide of interest, such a gene, under photoperiod sensitive control or photoperiod insensitive control are also provided. Screening methods are for identifying chemical agents that can modify photoperiod sensitivity are also disclosed.2014-03-06
20140068816Plants Having Enhanced Yield-Related Traits and Producing Methods Thereof - Provided is a method for enhancing yield-related traits in plants by modulating expression in a plant of a nucleic acid encoding a TLP (Tify like protein) polypeptide, a PMP22 polypeptide (22 kDa peroxisomal membrane like polypeptide), a RTF (REM-like transcription factor) polypeptide, or a BP1 (Bigger plant 1) polypeptide. Also provided are plants having modulated expression of a nucleic acid encoding a TLP, PMP22, RTF or BP1 polypeptide, which plants have enhanced yield-related traits compared to control plants.2014-03-06
20140068817EXPRESSION OF ISOMERS OF SUCROSE INCREASES SEED WEIGHT, SEED NUMBER AND/OR SEED SIZE - The present invention provides expression vectors comprising polynucleotides encoding chimeric sucrose isomerases, and methods of using the same. In addition, transgenic plants expressing said chimeric sucrose isomerases are provided. Furthermore, methods of increasing average seed weight, seed number and/or seed size of a plant by using said chimeric sucrose isomerases are provided.2014-03-06
20140068818METHOD FOR STABLE EXPRESSION OF SUPPRESSORS OF RNAI IN PLANTS BY DIRECT GENETIC TRANSFORMATION OF SEEDS - The present invention relates to a method for producing transgenic plants comprising 2014-03-06
20140068819POLYNUCLEOTIDES, POLYPEPTIDES ENCODED THEREBY, AND METHODS OF USING SAME FOR INCREASING ABIOTIC STRESS TOLERANCE AND/OR BIOMASS AND/OR YIELD IN PLANTS EXPRESSING SAME - Provided are methods of increasing tolerance of a plant to abiotic stress, and/or increasing biomass, growth rate, vigor and/or yield of a plant. The methods are effected by expressing within the plant an exogenous polynucleotide encoding a polypeptide comprising an amino acid sequence at least 90% homologous to the amino acid sequence selected from the group consisting of SEQ ID NOs:201, 207, 212, 202-206, 208-211, 213-391, 1655, 961-1529, and 1660-1663. Also provided are polynucleotides, nucleic acid constructs, polypeptides and transgenic plants expressing same which can be used to increase tolerance of a plant to abiotic stress, and/or increase biomass, growth rate, vigor and/or yield of a plant.2014-03-06
20140068820Pyrazole Compounds for Controlling Invertebrate Pests - The present invention relates to novel pyrazole compounds of the formulae I and II, to their salts and their N-oxides which can be used for combating or controlling invertebrate pests, in particular arthropod pests. The invention also relates to a method for controlling invertebrate pests by using these compounds. The present invention also relates to seed and to an agricultural and veterinary composition comprising said compounds.2014-03-06
20140068821STRONG ACTIVATION DOMAIN - A new and strong transcriptional activation domain was identified from the 2014-03-06
20140068822Method for Determining Local Resistivity and Carrier Concentration Using Scanning Spreading Resistance Measurement Set-Up - The disclosure is related to an SSRM method for measuring the local resistivity and carrier concentration of a conductive sample. The method includes contacting the conductive sample at one side with an AFM probe and at another side with a contact electrode, modulating, at a modulation frequency, the force applied to maintain physical contact between the AFM probe and the sample while preserving the physical contact between the AFM probe and the sample, thereby modulating at the modulation frequency the spreading resistance of the sample; measuring the current flowing through the sample between the AFM probe and the contact electrode; and deriving from the measured current the modulated spreading resistance. Deriving the modulated spreading resistance includes measuring the spreading current using a current-to-voltage amplifier, converting the voltage signal into a resistance signal, and filtering out from the resistance signal, the resistance amplitude at the modulation frequency.2014-03-06
20140068823MINIATURIZED CANTILEVER PROBE FOR SCANNING PROBE MICROSCOPY AND FABRICATION THEREOF - Cantilever probes are formed from a multilayer structure comprising an upper substrate, a lower substrate, an interior layer, a first separation layer, and a second separation layer, wherein the first separation layer is situated between the upper substrate and the interior layer, the second separation layer is situated between the lower substrate and the interior layer, and wherein the first and the second separation layers are differentially etchable with respect to the first and the second substrates, the interior layer. The upper substrate is a first device layer from which a probe tip is formed. The interior layer is a second device layer from which a cantilever arm is formed. The lower substrate is a handle layer from which a handle, or base portion, is formed. Patterning and etching processing of any layer is isolated from the other layers by the separation layers.2014-03-06
20140068824Hybrid tea rose plant named 'Big Guy' - A new variety of Hybrid Tea Rose suitable for garden decoration, having flowers of yellow coloration.2014-03-06
20140068825Floribunda rose plant named 'U.F.O.' - A new variety of Floribunda rose suitable for garden decoration, having flowers of orange coloration.2014-03-06
20140068826Strawberry plant named 'Walker' - This invention relates to a new and distinct June-bearing (short day responsive) strawberry plant named ‘Walker’ primarily adapted to the growing conditions of the west central New York and other regions of similar climate. The new plant is primarily characterized by longer than broad fruit, conical fruit shape, uniformity in shape between primary and secondary fruit, reflexed calyx, dark red-purple fruit color and glossy fruit skin.2014-03-06
Website © 2025 Advameg, Inc.