10th week of 2013 patent applcation highlights part 59 |
Patent application number | Title | Published |
20130061288 | METHOD FOR CONTROLLING TRUST AND CONFIDENTIALITY IN DAILY TRANSACTIONS OF THE DIGITAL ENVIRONMENT - The invention comprises a method for controlling trust and confidentiality during pervasive computing transactions supporting users' daily activities. | 2013-03-07 |
20130061289 | Secure Messaging - A secure messaging interface enables submission of messages to a messaging gateway via secure means over TLS. A destination mobile device(s) is notified of a pending secure message, and holds the secure message until it is retrieved by an authorized mobile device. The messaging gateway also provides push services for sending data to wireless devices. The secure messager enables sending devices to apply security to an individual message. Sending devices may include, e.g., an enterprise administration server; messages routed through an messaging gateway (MGW) portal; an user messaging application; or a user through a handset. The secured messages may include content as available today across any messaging protocol such as text, audio, video, binaries and images. | 2013-03-07 |
20130061290 | SYSTEM FOR SECURELY PERFORMING A TRANSACTION - A system and method for performing a transaction are described. A transaction request to perform a transaction is received. Authorization information necessary to perform the transaction is gathered and stored in a secure memory. The gathered authorization information is verified. A final command to perform the transaction is received. When the final command is received, the transaction is performed and the stored authorization information in the secure memory is erased. | 2013-03-07 |
20130061291 | Modular Device Authentication Framework - Systems, methods, and computer-readable media provide a requesting device with access to a service. In one implementation, a server receives a request to access a service, and the request includes a device type identifier of a device requesting access to the service. The server extracts the device type identifier from the request and determines a corresponding device type for the requesting device. An authentication module is selected from a plurality of authentication modules based on the device type identifier, and the selected authentication module implements an authentication scheme for the device type of the requesting device. The server authenticates the request using the selected authentication module to determine whether the requesting device is permitted to access the service, and provides access to the service based on at least a determination that the requesting device is authorized to access the service. | 2013-03-07 |
20130061292 | METHODS AND SYSTEMS FOR PROVIDING NETWORK SECURITY IN A PARALLEL PROCESSING ENVIRONMENT - A method of providing network security for executing applications is disclosed. One or more servers including a plurality of microprocessors and a plurality of network processors are provided. A first grouping of microprocessors executes a first application. The first application is executed using the microprocessors in the first grouping. The microprocessors in the first grouping of microprocessors are permitted to communicate with each other via one or more of the network processors. A second grouping of microprocessors executes a second application. At least one server has one or more microprocessors for executing the first application and one or more different microprocessors for executing the second application. The second application is executed using the microprocessors in the second grouping of microprocessors. One or more of the network processors prevent the microprocessors in the first grouping from communicating with the microprocessors in the second grouping during periods of simultaneous execution. | 2013-03-07 |
20130061293 | METHOD AND APPARATUS FOR SECURING THE FULL LIFECYCLE OF A VIRTUAL MACHINE - Systems and methods for securing a virtual machine are disclosed. Various embodiments of the systems and methods disclosed herein allow provisioning a trusted and secure computing environment to a user. Various embodiments enable securing a virtual machine during multiple states, such as during run time, construction time and rest time. In one embodiment, a virtualization infrastructure for securing a virtual machine includes a trusted computing base and a proxy virtual machine running on the virtualization infrastructure as a proxy of the trusted computing base, the trusted computing base being configured to cryptographically verify the proxy virtual machine to be authentic and to prevent unauthorized access to the proxy virtual machine. The proxy virtual machine may be configured to compute an exit state measurement of the virtual machine and to use the exit state measurement to prevent an unauthorized entry of the virtual machine into the virtualization infrastructure. | 2013-03-07 |
20130061294 | NETWORK ATTACHED DEVICE WITH DEDICATED FIREWALL SECURITY - Dedicated firewall security for a network attached device (NAD) is provided by a firewall management system integrated directly into the NAD or into a NAD server. A local area network arrangement includes a network client and the NAD and the firewall management system includes computer readable medium having computer-executable instructions that perform the steps of receiving a request for network access to the NAD from the network client, determining whether the request for network access to the NAD is authorised, and only if the request for network access is authorized, providing the network client with network access to the NAD. | 2013-03-07 |
20130061295 | Providing Status of Site Access Requests - Concepts and technologies are described herein for providing status of site access requests. In accordance with the concepts and technologies disclosed herein, a user attempts to access functionality of a server application that is limited to authorized users. In response to the access attempt, the server application determines if the user is authorized to access the functionality and if the user has previously requested access to the functionality. If the user has not previously requested access to the application, the server application can present a user interface to the user for requesting access to the server application. If the user has previously requested access to the application, the server application can present an indication that an access request already exists, history and status information associated with the access request, and/or an interface for submitting messages to the site owner or other entity. | 2013-03-07 |
20130061296 | SOCIAL DISCOVERY OF USER ACTIVITY FOR MEDIA CONTENT - Aspects of the present disclosure provide techniques that may enable user activity information to be automatically generated and shared with other users of a social network. In one example, a method of automatically publishing, to one or more social network services, information about user activities regarding media content items includes receiving user activity information regarding a media content item, wherein a user is a member of one or more social network services, and the user activity information is generated in response to one or more activities taken by the user with respect to the media content item. The method may also include receiving an indication of one or more users of the one or more social network services to whom the user activity information is to be made accessible, and automatically publishing the user activity information to the one or more social network services. | 2013-03-07 |
20130061297 | HOME NETWORKING WEB-BASED SERVICE PORTAL - A web-based service portal provides a user interface to configure and/or access device(s) of a home network. The service portal can communicate with device(s) through application program interfaces (APIs). The service portal can provide a standardized user interface for specific feature(s) of a device. | 2013-03-07 |
20130061298 | AUTHENTICATING SESSION PASSWORDS - A method for authenticating a password is provided. An authentication server device receives a plurality of password segments associated with a password from a client device over a plurality of communication channels. The authentication server device reconstructs the password from the plurality of password segments based on a particular set of parameters identified by a selected session key identification number. The authentication server device sends the reconstructed password to a target device for comparison with a stored password associated with the client device. If the stored password matches the reconstructed password, then the target device establishes a session with the client device so that the client device may access a resource located on the target device. In addition, the authentication server device closes the plurality of communication channels established with the client device in response to the authentication server receiving a notification that the reconstructed password matches the stored password. | 2013-03-07 |
20130061299 | DISTRIBUTED COMPUTER SYSTEMS WITH TIME-DEPENDENT CREDENTIALS - A distributed system in which time-dependent credentials are supplied by controllers that operate according to different local times. Errors that might arise from the controllers generating inconsistent credentials because of time skew are avoided by identifying credentials generated during transition intervals in which different ones of the controllers may generate different credentials at the same absolute time. During a transition interval, controllers and other devices may use credentials differentially based on the nature of the authentication function. Each controller may periodically renew its credentials based on self-scheduled renewals or based on requests from other devices, such that renewal times are offset by random delays to avoid excessive network traffic. Controllers may determine which credential is valid for any given time, based on a cryptographically secure key associated with that time and information identifying the entity that is associated with that credential. | 2013-03-07 |
20130061300 | DISTRIBUTED COMPUTER SYSTEMS WITH TIME-DEPENDENT CREDENTIALS - A distributed system in which time-dependent credentials are supplied by controllers that operate according to different local times. Errors that might arise from the controllers generating inconsistent credentials because of time skew are avoided by identifying credentials generated during transition intervals in which different ones of the controllers may generate different credentials at the same absolute time. During a transition interval, controllers and other devices may use credentials differentially based on the nature of the authentication function. Each controller may periodically renew its credentials based on self-scheduled renewals or based on requests from other devices, such that renewal times are offset by random delays to avoid excessive network traffic. Controllers may determine which credential is valid for any given time, based on a cryptographically secure key associated with that time and information identifying the entity that is associated with that credential. | 2013-03-07 |
20130061301 | DISTRIBUTED COMPUTER SYSTEMS WITH TIME-DEPENDENT CREDENTIALS - A distributed system in which time-dependent credentials are supplied by controllers that operate according to different local times. Errors that might arise from the controllers generating inconsistent credentials because of time skew are avoided by identifying credentials generated during transition intervals in which different ones of the controllers may generate different credentials at the same absolute time. During a transition interval, controllers and other devices may use credentials differentially based on the nature of the authentication function. Each controller may periodically renew its credentials based on self-scheduled renewals or based on requests from other devices, such that renewal times are offset by random delays to avoid excessive network traffic. Controllers may determine which credential is valid for any given time, based on a cryptographically secure key associated with that time and information identifying the entity that is associated with that credential. | 2013-03-07 |
20130061302 | Method and Apparatus for the Protection of Computer System Account Credentials - There is described methods, systems and software for creating, managing and using authentication credentials. The invention maintains for each user two authentication credentials—external and internal authentication credentials that share the same number of authentication factors of the same type. These are stored in a data store [ | 2013-03-07 |
20130061303 | Authentication System and Method in a Contactless Environment - A method of providing continuous authentication in a contactless environment is provided. The method includes providing a reader having a contactless interface, as well as a device, operable to communicate with the reader. The method further includes the steps of receiving at the reader a first authentication request from the device, and communicating from the reader a second authentication request to a secure transaction service. The secure transaction service holds authentication credentials relating to the device. Authentication credentials relating to the device are received at the reader from the secure transaction service, and the reader provides continuous authentication based at least in part on the authentication credentials received from the secure transaction service. | 2013-03-07 |
20130061304 | PRE-CONFIGURED CHALLENGE ACTIONS FOR AUTHENTICATION OF DATA OR DEVICES - An authentication system is enhanced by prompting an individual to perform a challenge action. For example, the individual may be requested to move the device in a particular motion, after entering a username/password combination. The challenge action is known only by the individual, such that an imposter, even with authentication information, does not know the challenge action. The challenge action improves security by preventing attackers from spoofing an individual's authentication information. The enhanced authentication system may be used on mobile devices, such as mobile phones and laptop computers, to provide access to secure data, such as bank account information. | 2013-03-07 |
20130061305 | RANDOM CHALLENGE ACTION FOR AUTHENTICATION OF DATA OR DEVICES - An authentication system is enhanced by prompting an individual to perform a randomly-selected challenge action. For example, the individual may be requested to move the device in a particular motion, after entering a username/password combination. The randomly-selected challenge action verifies the individual is located at the device, which prevents automated attacks to steal the individual's identity. The challenge action improves security by preventing attackers from spoofing an individual's authentication information. The enhanced authentication system may be used on mobile devices, such as mobile phones and laptop computers, to provide access to secure data, such as bank account information. | 2013-03-07 |
20130061306 | HYBRID CLOUD IDENTITY MAPPING INFRASTRUCTURE - In various exemplary embodiments, a system and associated method for providing a hybrid cloud computing environment are disclosed. For example, a system may authorize an enterprise user based on an enterprise identity. Once authenticated, embodiments may use mapping data and a cloud role to determine an identity to use when the enterprise user accesses a cloud. | 2013-03-07 |
20130061307 | Method and Apparatus for Accessing Corporate Data from a Mobile Device - A computer-implemented communication method performed by a computerized device and a computerized communication apparatus, the method comprising: receiving by a buffer server a first communication request and a device key from a mobile device; verifying the device key and a buffer server key; sending a request with details associated with the device key and the buffer server key, to a corporate server; receiving a response from the corporate server; removing data from the response, and sending a reduced response to the mobile device; receiving a user identification and a second communication request from the mobile device, for the data that has been removed; and sending the data that has been removed to the mobile device, upon verifying the user identification. | 2013-03-07 |
20130061308 | COMPUTER PROGRAM CODE AND METHOD FOR DELIVERING EXTERNAL DATA TO A PROCESS RUNNING ON A VIRTUAL MACHINE - A method and system for delivering external data to a process running on a virtual machine, the virtual machine running on an operating system. The method includes the steps of executing instructions on the virtual machine that obtain state data related to the process; querying the virtual machine to obtain component data related to the state data; and manipulating the component data to deliver the external data to the process. In one example, the system provides a single sign-on application that passes user credentials to a Java applet running on a Java virtual machine. | 2013-03-07 |
20130061309 | Per Process Networking Capabilities - Per process networking capability techniques are described. In one or more implementations, a determination is made as to whether access to a network capability is permitted for a process that is executed on the computing device based on a token that is associated with the process. The token has one or more security identifiers that reference one or more network capabilities described in a manifest. The access to the network capability is managed based on the determination. | 2013-03-07 |
20130061310 | SECURITY SERVER FOR CLOUD COMPUTING - A system, method, and server improving the security of accessing Internetworked computer resources, especially over public access connections, without requiring additional servers from either the resource provider or the authenticating user. User authentications are transmitted over data access connections over which users do not have administrative rights and/or physical security control. A resource request which includes user authentications can be encrypted on a user computer and transmitted over the internet or other data network over which the user has no administrative access or physical control. A security server receives the encrypted resource request, decrypts it, and forwards the resource request to a cloud computing resource. | 2013-03-07 |
20130061311 | SECURITY SYSTEM FOR CLOUD COMPUTING - Security system for cloud computing that will improve the security of users' authentications to cloud data and resources. User authentication to cloud resources requires analyzing confidence in the hardware used to transmit the authentication for access to the cloud data and/or resource. User authentication can be transmitted after the user confirms administrative rights and/or physical security control over the hardware used to transmit the authentication for access to the cloud data and/or resource. The hardware used to access the cloud data and/or resource can be analyzed for malicious code before the user authentication is transmitted. The authentication can be provided on a hardware token, and the system can execute on the hardware token to analyze hardware confidence and thereafter transmit the user authentication. | 2013-03-07 |
20130061312 | SECURITY TOKEN FOR SECURELY EXECUTING AN APPLICATION ON A HOST COMPUTER - The invention relates to a security token comprising a communication interface adapted to communicate with a host computer; a security module, comprising encryption based security features; a non volatile memory storing at least an application to be uploaded and executed in a host computer. The application makes use of the security features when executed in a host computer in communication with the communication interface. The security token is adapted to modify the content of the application as uploaded or its execution parameters at successive connexions of the security token to a host computer. | 2013-03-07 |
20130061313 | ULTRA-LOW POWER SINGLE-CHIP FIREWALL SECURITY DEVICE, SYSTEM AND METHOD - A firewall security device, system and corresponding method are provided that includes an operating system of an entirely new architecture. The operating system is based fundamentally around a protocol stack (e.g., TCP/IP stack), rather than including a transport/network layer in a conventional core operating system. The firewall security device may include a processor and an operating system (OS) embedded in the processor. The OS may include a kernel. The operating system kernel is a state machine and may include a protocol stack for communicating with one or more devices via a network interface. The OS may be configured to receive and transmit data packets and block unauthorized data packets within one or more layers of the protocol stack based on predetermined firewall policies. | 2013-03-07 |
20130061314 | SECURE SOFTWARE INSTALLATION - Embodiments of the present disclosure provide methods and systems for securely installing software on a computing device, such as a mobile device. In one embodiment, the device executes an installer that securely installs the software. In order to perform installations securely, the installer configures one or more secure containers for the software and installs the software exclusively in these containers. In some embodiments, the installer randomly determines the identifiers for the containers. These identifiers remain unknown to the software to be installed. Instead, an installation framework maintains the correspondence between an application and its container. Other methods and apparatuses are also described. | 2013-03-07 |
20130061315 | Storage Device with Accessible Partitions - A detachable storage device can comprise a memory, circuitry, and a user interface. The memory may comprise a storage partition. The circuitry may be configured to authorize access to the storage partition to a digital device when the detachable storage device is coupled to the digital device based, at least in part, on a user code. The user interface may be configured to receive the user code while the detachable storage device is within a detached state and provide the user code to the circuitry to allow access to the storage partition. | 2013-03-07 |
20130061316 | Capability Access Management for Processes - Capability access management techniques for processes are described. In one or more implementations, a token is formed having one or more security identifiers that reference capabilities described in a manifest for the executable code responsive to an input received to initiate execution of executable code installed on the computing device. The one or more processes formed through execution of the executable code on the computing device are associated with the token, the token usable to manage access of the one or more processes to the capabilities of the computing device. | 2013-03-07 |
20130061317 | SYSTEM AND METHOD FOR ACCESS CONTROL IN A PORTABLE ELECTRONIC DEVICE - A method of access control in an electronic device includes monitoring for input at the electronic device, for each input determined to be one of a plurality of predefined gestures including gestures from a touch-sensitive input device or from a movement sensor, mapping the input to a respective Unicode character and adding the respective Unicode character to a passcode to provide an entered passcode, comparing the entered passcode to a stored passcode, and changing an access state at the electronic device if the entered passcode matches the stored passcode. | 2013-03-07 |
20130061318 | USER-DEFINED MULTIPLE INPUT MODE AUTHENTICATION - A user can define two or more input modes with respective input values to establish an authentication protocol to unlock a computer or govern other computer behavior. As an example, the user may first establish a particular voice recognition pattern followed by a particular image recognition and subsequent logons can be accomplished only by speaking the voice recognition pattern into the device and then by presenting the commanded image, such as an image of the use's face, to the device. | 2013-03-07 |
20130061319 | INFORMATION PROCESSING APPARATUS, AND USER AUTHENTICATION METHOD FOR INFORMATION PROCESSING APPARATUS - An information processing apparatus to execute an application includes first and second authentication units, first and second storage units, a request unit, and an application execution unit. The first authentication unit authenticates a user of the information processing apparatus. The first storage unit stores first certification information relating to the authentication of a user. The request unit requests a second authentication unit to perform authentication required to execute the application using the first certification information when the application is executed based on an instruction from the user authenticated by the first authentication unit. The application execution unit executes the application when the authentication performed by the second authentication unit based on the request by the request unit has succeeded. The second storage unit stores second certification information relating to the second authentication unit authentication required to execute the application after associating the second certification information with the first certification information. | 2013-03-07 |
20130061320 | Computer Device with Anti-Tamper Resource Security - A computer device provides an execution environment that supports a plurality of processes. A plurality of key resources are associated with a security application that may perform process elevation to grant privileged access rights to a user process. A security module controls access to the key resources using an access control list. An anti-tamper mechanism creates a protection group as a local security group and adds a deny access control entry to the access control list. The anti-tamper mechanism intercepts the user process and creates a revised access token identifying the user process as a member of the protection group. The security module matches the protection group in the revised access token of the user process against the deny access control entry in the access control list of the key resources thereby restricting access by the user process even though the user process otherwise has privileges to access those resources. | 2013-03-07 |
20130061321 | Using Aggregated DNS Information Originating from Multiple Sources to Detect Anomalous DNS Name Resolutions - A DNS security system collects and uses aggregated DNS information originating from a plurality of client computers to detect anomalous DNS name resolutions. A server DNS security component receives multiple transmissions of DNS information from a plurality of client computers, each transmission of DNS information concerning a specific instance of a resolution of a specific DNS name. The server component aggregates the DNS information from the multiple client computers. The server component compares DNS information received from a specific client computer concerning a specific DNS name to aggregated DNS information received from multiple client computers concerning the same DNS name to identify anomalous DNS name resolutions. Where an anomaly concerning received DNS information is identified, a warning can be transmitted to the specific client computer from which the anomalous DNS information was received. | 2013-03-07 |
20130061322 | Systems and Methods for Detecting Design-Level Attacks Against a Digital Circuit - Systems and methods for detecting design-level attacks against a digital circuit which includes various functional units. A target unit is selected from among the functional units for monitoring and a predictor unit is arranged to receive events before they reach the target unit. A reactor unit is selected from among the functional units of the digital circuit which are arranged to receive events after they pass through the target unit. A monitor unit is arranged to receive predicted event messages from the predictor unit and actual event messages from the reactor unit. The monitor unit is configured to indicate an alarm based on a comparison of the predicted event messages received from the predictor unit and the actual event messages received from the reactor unit. | 2013-03-07 |
20130061323 | SYSTEM AND METHOD FOR PROTECTING AGAINST MALWARE UTILIZING KEY LOGGERS - A software, system and methodology for protecting against malware key logger attacks that utilize, for example, form-grabbing techniques. The application protects the browser from key logging malware attacks, and the loss of critical user confidential information often entered into internet forms for the purpose of buying items or logging into financial institutions. An embodiment of a method for blocking form-grabbing attacks includes the following steps. Upon detecting a form submission event from the browser, and immediately after allowing the data to be properly submitted, the form input fields are cleared of data. The method prevents hook-based key loggers or form-grabbing key loggers from capturing form input data, thereby protecting the user from theft of passwords or credentials. | 2013-03-07 |
20130061324 | SIGNATURE CHECKING USING DETERMINISTIC FINITE STATE MACHINES - The occurrence of false positives and the post-processing of digital streams subjected to examination by a deterministic finite state machine for character strings are reduced by combining location-based pattern matching, e.g. on packet headers, and content-based pattern matching, e.g. on payloads of packets. One scheme allows automatic transition from a header match state into an initial state of a content matching machine. Another scheme is based on a rules graph defining strings of match states and the examination of a list of match states (rather than characters) which have been previously determined, for example by means of header matching and content matching. The latter is also capable of comparing offset and depth values associated with the match states with offset and depth criteria. | 2013-03-07 |
20130061325 | Dynamic Cleaning for Malware Using Cloud Technology - A method for providing malware cleaning includes detecting potential malware on a first device connected to a network. A request including information to allow a second device connected to the network to determine an appropriate cleaning response is sent from the first device to the second device over the network. Upon receiving the request, the second device attempts to identify an appropriate cleaning response and, if a response is identified, sends the cleaning response over the network to the first device. The cleaning response is usable by the first device to address the detected potential malware. | 2013-03-07 |
20130061326 | BROWSING SUPPORT INFRASTRUCTURE WITH TIERED MALWARE SUPPORT - A network browser has a Malware detection manager for direct or indirect scanning of files during an upload or download processes for viruses, adware, spyware, etc. The malware detection manager defines and employs a quarantine bin, which is an isolated and secure memory space or directory for temporary placement of file packets during the file transmission while malware detection can commence. The malware detection manager scans for malware code associated with the packet sequence encountered during a file transmission to and from the Internet, during which it quarantines all the scanned packets in the quarantine bin. Quarantined files can be released if there is a human challenge authorizing the release of the file. Exchanging a Malware free signature between server and client via a trusted download center may be done so the client device need not scan the files for malware if content is certified and guaranteed as malware-free. | 2013-03-07 |
20130061327 | System and Method for Evaluation in a Collaborative Security Assurance System - A security assurance system includes a back-end application and a computing resource. The back-end application receives a selection of a network security product that is associated with a protected network, and receives a selection of a threat from a plurality of threats stored on the security assurance system. The computing resource launches an evaluation of the security product based upon the threat, and reports to a user of the security assurance system a result of the evaluation. | 2013-03-07 |
20130061328 | INTEGRITY CHECKING SYSTEM - An integrity checking system provides improved monitoring of an electronic device for unauthorized access and modification. The integrity checking system includes a controller with a secure memory. The secure memory stores test profile information, such as test type, test subject, test action, expected test response, test frequency, and result action. The controller reads the test profile information and executes the defined tests to monitor the integrity of the device, and either permit normal operation, or execute the result action (e.g., terminate program execution) depending on the test results. | 2013-03-07 |
20130061329 | Method Of Decrypting An Electronic Document For The Safety Management Of The Electronic Document - A method of encrypting/decrypting the document and a safety management storage device and system method of its safety management, using for the safety management of electronic documents, the said system comprising a PC or mainframe installed with common reading software and a storage device of safety management connected to the said PC/mainframe through hot-plug; when connected to the mainframe, the said storage device is enumerated as a USB CDROM device at least. The user owns the said storage device can encrypt the electronic documents by using the encryption keys to generate an encrypted document with the same file type, also can open the encrypted document by using common reading software, and then use the document according to the predetermined operation authority. | 2013-03-07 |
20130061330 | METHOD AND SYSTEM FOR CONFIGURING CONSTRAINTS FOR A RESOURCE IN AN ELECTRONIC DEVICE - The present invention provides a method and system for configuring constraints for a resource in an electronic device. The method includes identifying context of use/access of a resource and implementing permissions/constraints as per the identified context. The method includes identifying an existing work environment of a resource by capturing information through an application program interface (API), identifying constraints for the resource with respect to the identified work environment from a constraint specification file for the resource which contains constraint details for all work environments, and either configuring the identified constraints for the resource, or modifying the identified work environment for the resource and configuring corresponding constraints for the resource. | 2013-03-07 |
20130061331 | Assigning Access Rights in Enterprise Digital Rights Management Systems - The present subject matter relates to assigning access rights in enterprise digital rights management (eDRM) systems. In one embodiment, a method includes receiving, by an enterprise digital rights management (eDRM) device, user data corresponding to a plurality of users. Further, the method includes creating a user group based on the user data. The user group, thus created, is sent for storage in a repository associated with an eDRM server, enabling the user group to be accessible by a plurality of eDRM devices. | 2013-03-07 |
20130061332 | Computational systems and methods for verifying personal information during transactions - Methods, apparatuses, computer program products, devices and systems are described that carry out accessing at least one persona that includes a unique identifier that is at least partly based on a first user's device-identifier data and the first user's network-participation data; verifying the persona by comparing the first user's device-identifier data and the first user's network-participation data of the unique identifier to a second user's device-identifier data and the second user's network-participation data; and presenting the persona in response to a request for personal information. | 2013-03-07 |
20130061333 | Computational systems and methods for verifying personal information during transactions - Methods, apparatuses, computer program products, devices and systems are described that carry out accessing at least one persona that includes a unique identifier that is at least partly based on a first user's device-identifier data and the first user's network-participation data; verifying the persona by comparing the first user's device-identifier data and the first user's network-participation data of the unique identifier to a second user's device-identifier data and the second user's network-participation data; and presenting the persona in response to a request for personal information. | 2013-03-07 |
20130061334 | METHOD AND SYSTEM FOR FILTERING UNAUTHORIZED ELECTRONIC MAIL MESSAGES - A computer system and method for filtering unauthorized electronic mail messages that are sent by senders to a user. In one embodiment, the system includes a list of the identifications of the senders who are authorized to send an electronic mail message to the user. When an electronic mail message is received, the system determines whether the identification of sender in the electronic mail message is in the list of the identifications of the senders who are authorized. When the sender of the electronic mail message is determined to be authorized, the system stores the electronic mail message in a designated folder. When the sender of the electronic mail message is determined to be not authorized, the system stores the electronic mail message in a folder other than the designated folder. | 2013-03-07 |
20130061335 | Method, Apparatus, Computer Readable Media for a Storage Virtualization Middleware System - A method stored on a computer useable medium for sharing digital assets. The method includes a virtual workspace containing links to multiple digital assets, the digital assets being stored on one or more secondary storage mediums. The method involves displaying at least some of the links to the digital assets in the workspace for an individual to access; receiving a request from the individual to access one of the digital assets in the workspace; retrieving a storage connector stored on the first storage medium, the storage connector being specifically associated with the digital asset; using the storage connector to translate the request to access from the individual to a request to access associated with the digital asset; and accessing the actual digital asset in response to the individual's request. A system and product are also disclosed for use with the method. | 2013-03-07 |
20130061336 | STANDING ORDER DATABASE SEARCH SYSTEM AND METHOD FOR INTERNET AND INTRANET APPLICATION - An internet and/or intranet based system and method for limiting access to confidential records to properly authorized and authenticated parties. The system's central premise is that the person to whom such records pertain should control access rights through specific, informed consent. It reinforces the widely held conception of privacy in general, while also providing an expedited and cost efficient means to find and transfer confidential records. It also gives the repositories where these records are held the right to stipulate the specific terms and conditions that must be fulfilled before they will release documents. And it carries out all of these legitimate interests in a way that is fast, simple to use and easy to audit. The system optionally includes a billing mechanism to pay for any added cost associated with providing this additional protection; and in its preferred embodiment, is applicable to both digital as well as non-digital records. | 2013-03-07 |
20130061337 | SECURING SHIPMENT INFORMATION ACCESSED BASED ON DATA ENCODED IN MACHINE-READABLE DATA BLOCKS - Example embodiments provide a Shipment Preparation System (“SPS”), which facilitates the preparation of shipments, such as by producing shipping labels. In one embodiment, the SPS is configured to receive shipment preparation information from a bar code or other machine-readable data block in a packing list. The shipment preparation information identifies a uniform resource identifier (“URI”) that identifies a code module that is remote from the SPS. The shipment preparation information and/or the URI further includes an access token. The SPS then uses the URI to communicate with the code module in order to access shipment information (e.g., to read a read a shipping address, to store an indication that a shipment is ready for pick up). The code module restricts access to the shipment information based on the access token, such as by only allowing a limited number or duration of access via the token. | 2013-03-07 |
20130061338 | SCREENING OF DRUG FOR ATTENTION DEFICIT HYPERACTIVE DISORDER BY USING GIT1 KNOCK-OUT MICE AS A NOVEL ADHD MOUSE MODEL - Provided is a method of using any mammal except humans, in particular, a mammal as an attention deficit hyperactivity disorder model, wherein genes of G protein-coupled receptor kinase interacting protein 1 (GIT1) as a neuronal synapse protein in the brain are knocked out from the mammal. In addition, disclosed is analysis of GIT1 knock-out mice in aspects of molecular biology, cellular biology, electrical biology and animal behavior and, more particularly, a screening method of novel drug, wherein excessive behavior as an attention deficit hyperactive disorder as well as recovery of theta wave in the frontal lobe are observed by administering a candidate material of the drug, thereby inducing recovery of the attention deficit hyperactivity disorder. | 2013-03-07 |
20130061339 | METHOD OF DIAGNOSING TRICHOTILLOMANIA AND SIMILAR DISORDERS IN HUMANS AND RODENTS - The present disclosure provides a method of diagnosing neurological disorders including for example, impulse control disorders, such as barbering and trichotillomania using biomarkers such as reductive capacity of urine and 8-OH-dG concentration. Still other disorders that can be diagnosed based on the measurements of makers for oxidative stress include autism and Parkinson's disease. | 2013-03-07 |
20130061340 | Identification and Enrichment of Cell Subpopulations - Markers useful for the identification, characterization and, optionally, the enrichment or isolation of tumorigenic cells or cell subpopulations are disclosed. | 2013-03-07 |
20130061341 | MEGANUCLEASE VARIANTS CLEAVING A DNA TARGET SEQUENCE FROM A XP GENE AND USES THEREOF - An I-CreI variant which has at least two substitutions, one in each of the two functional subdomains of the LAGLIDADG (SEQ ID NO: 229) core domain situated from positions 26 to 40 and 44 to 77 of I-CreI, said variant being able to cleave a DNA target sequence from a xeroderma pigmentosum gene. Use of said variant and derived products for the prevention and the treatment of Xeroderma pigmentosum. | 2013-03-07 |
20130061342 | Identification and Enrichment of Cell Subpopulations - Markers useful for the identification, characterization and, optionally, the enrichment or isolation of tumorigenic cells or cell subpopulations are disclosed. | 2013-03-07 |
20130061343 | IN VIVO GENE REGULATION BY THE COMBINATION OF KNOCK-IN-TETO SEQUENCE INTO THE GENOME AND TETRACYCLINE-CONTROLLED TRANS-SUPPRESSOR (TTS) PROTEIN - Disclosed is a FAST (Flexible Accelerated STOP TetO-knockin) system, an efficient method for manipulating gene expression in vivo to rapidly screen animal models of disease. This invention further discloses a single gene targeting event yielding 2 distinct knockin mice—STOP-tetO and tetO knockin—which permit generation of multiple strains with variable expression patterns: 1) knockout, 2) Cre-mediated rescue; 3) tTA-mediated misexpression; 4) tTA-mediated overexpression; and 5) tTS-mediated conditional knockout/knockdown. Using the FAST system, multiple gain- and loss-of-function strains can therefore be generated on a timescale not previously achievable. These strains can then be screened for clinically-relevant abnormalities. The flexibility and broad applicability of the FAST system is demonstrated by targeting several genes encoding proteins implicated in neuropsychiatric disorders: Mlc1, Neuroligin 3, the serotonin 1A receptor, and the serotonin 1B receptor. | 2013-03-07 |
20130061344 | BEAN VARIETY RX 08075309 - The invention provides seed and plants of the bean line designated RX 08075309. The invention thus relates to the plants, seeds and tissue cultures of bean line RX 08075309, and to methods for producing a bean plant produced by crossing a plant of bean line RX 08075309 with itself or with another bean plant, such as a plant of another line. The invention further relates to seeds and plants produced by such crossing. The invention further relates to parts of a plant of bean line RX 08075309, including the pods and gametes of such plants. | 2013-03-07 |
20130061345 | TRANSCRIPTION REGULATORS FOR IMPROVING PLANT PERFORMANCE - Transcription factor polynucleotides and polypeptides incorporated into nucleic acid constructs, including expression vectors, have been introduced into plants and were ectopically expressed. Transgenic plants transformed with many of these constructs have been shown to have increased tolerance to an abiotic stress (in some cases, to more than one abiotic stress), increased growth, and/or increased biomass. The abiotic stress may include, for example, salt, hyperosmotic stress, water deficit, heat, cold, drought, and/or low nutrient conditions. | 2013-03-07 |
20130061346 | INSECT RESISTANT AND HERBICIDE TOLERANT SOYBEAN EVENT 9582.814.19.1 - Soybean event 9582.814.19.1 comprises genes encoding Cry1F, Cry1Ac (synpro), and PAT, affording insect resistance and herbicide tolerance to soybean crops containing the event, and enabling methods for crop protection and protection of stored products. | 2013-03-07 |
20130061347 | QTL ASSOCIATED WITH APHID RESISTANCE IN SOYBEANS AND METHODS OF THEIR USE - This invention relates to methods of identifying and/or selecting soybean plants or germplasm that display improved antibiosis and/or antixenosis resistance to one or more biotypes of soybean aphid. In certain examples, the method comprises detecting at least one marker, haplotype, or marker profile that is associated with improved soybean aphid resistance. Also included are plants selected by the given methods and primers, probes, and kits useful for such methods. | 2013-03-07 |
20130061348 | Nucleic Acid Sequences Encoding Proteins Associated with Abiotic Stress Responses and Plant Cells with Increased Tolerance to Environmental Stress - This invention relates generally to nucleic acid sequences encoding proteins that are associated with abiotic stress responses and abiotic stress tolerance in plants. This invention further relates to transformed plant cells with altered metabolic activity compared to a corresponding non transformed wild type plant cell, wherein the metabolic activity is altered by transformation with a Stress-Related Protein (SRP) coding nucleic acid and results in increased tolerance and/or resistance to an environmental stress as compared to a corresponding non-transformed wild type plant cell. | 2013-03-07 |
20130061349 | Transformation of Juvenile and Mature Citrus - The invention relates to methods and compositions for genetic transformation of both juvenile and mature citrus. In some embodiments, the invention provides methods and compositions for genetic transformation of citrus using | 2013-03-07 |
20130061350 | PLANTS AND SEEDS OF COMMON WHEAT CULTIVAR WB-700 - A wheat cultivar, designated WB-700, is disclosed. The invention relates to the seeds, plants, and hybrids of wheat cultivar WB-700, and to methods for producing a wheat plant produced by crossing plants from wheat cultivar WB-700 with themselves or with plants from another wheat variety. The invention also relates to methods for producing a wheat plant containing in its genetic material one or more transgenes and to the transgenic wheat plants and plant parts produced by those methods. The invention also relates to wheat varieties or breeding varieties and plant parts derived from wheat cultivar WB-700, to methods for producing other wheat varieties, lines or plant parts derived from wheat cultivar WB-700, and to the wheat plants, varieties, and their parts derived from the use of those methods. The invention further relates to hybrid wheat seeds and plants produced by crossing wheat cultivar WB-700 with another wheat cultivar. | 2013-03-07 |
20130061351 | METHOD FOR PRODUCING RECOMBINANT PROTEINS FROM PLANT HAIRY ROOTS - The invention relates to a method for producing recombinant proteins from transgenic hairy roots, in particular transgenic hairy roots obtained by transforming plants belonging to the Brassicaceae family with | 2013-03-07 |
20130061352 | Plant Defense Signal Peptides - A 23 amino acid peptide, AtPep1, plays an important role as a signaling component of the innate immune system of | 2013-03-07 |
20130061353 | TRANSGENIC ALOE PLANTS FOR PRODUCTION OF PROTEINS AND RELATED METHODS - The present inventions provide transgenic aloe plants and recombinant constructs for transforming aloe plants, aspects of which, may be applied to other monocots. The recombinant constructs may include one or more DNA sequences encoding mammalian proteins and at least one promoter capable of directing the expression of recombinant proteins in an aloe plant. The present inventions also provide methods for constructing and reproducing a transgenic aloe plant. The present inventions include methods for transfection of an aloe plant with several genes of interest simultaneously. The aloe plant production methods of the inventions may provide the potential to inexpensively and more safely mass-produce some biologically active compounds including biopharmaceuticals for disease therapy, diagnosis and prevention, and is more accessible to the less affluent countries. The aloe plant production methods may also produce proteins for cosmetics. | 2013-03-07 |
20130061354 | POLYPEPTIDE HAVING CELLOBIOHYDROLASE ACTIVITY AND USES THEREOF - The invention relates to a polypeptide comprising the amino acid sequence set out in SEQ ID NO: 2 or an amino acid sequence encoded by the nucleotide sequence of SEQ ID NO: 1, or a variant polypeptide or variant polynucleotide thereof, wherein the variant polypeptide has at least 93% sequence identity with the sequence set out in SEQ ID NO: 2 or the variant polynucleotide encodes a polypeptide that has at least 93% sequence identity with the sequence set out in SEQ ID NO: 2. The invention features the full length coding sequence of the novel gene as well as the amino acid sequence of the full-length functional polypeptide and functional equivalents of the gene or the amino acid sequence. The invention also relates to methods for using the polypeptide in industrial processes. Also included in the invention are cells transformed with a polynucleotide according to the invention suitable for producing these proteins. | 2013-03-07 |
20130061355 | COMPOSITIONS AND METHODS FOR ENHANCING RESISTANCE TO NORTHERN LEAF BLIGHT IN MAIZE - The invention relates to methods and compositions for identifying and selecting maize plants with enhanced resistance to northern leaf blight. Maize plants generated by the methods of the invention are also a feature of the invention. | 2013-03-07 |
20130061356 | Active Damping of High Speed Scanning Probe Microscope Components - A technique for actively damping internal vibrations in a scanning probe microscope is disclosed. The excitation of various mechanical movements, including resonances, in the mechanical assembly of an SPM can adversely effect its performance, especially for high speed applications. An actuator is used to compensate for the movements. The actuator may operate in only the z direction, or may operate in other directions. The actuator(s) may be located at positions of antinodes. | 2013-03-07 |
20130061357 | METHOD OF DETERMINING A SPRING CONSTANT OF A CANTILEVER AND SCANNING PROBE MICROSCOPE USING THE METHOD - In a cantilever which is used in a scanning probe microscope or the like and has a trapezoidal cross-sectional shape formed through anisotropic etching in a silicon process, a cantilever spring constant is determined without measuring a thickness directly. A cantilever thickness is determined based on upper base and lower base lengths of the trapezoidal cross-sectional shape and geometric regularity of a surface generated by the anisotropic etching. Then, the cantilever spring constant is determined based on the cantilever thickness, a cantilever length, and a Young's modulus. | 2013-03-07 |
20130061358 | Rosa hybrida shrub named 'AUSblanket' - A variety of rose plant of the shrub class, named ‘AUSblanket’. The ‘AUSblanket’ rose is a plant having a strongly fragrant myrrh scent, buds that are round and rich butter yellow developing into a pale softer creamy color that maintains the rounded chalice shape of the early bud, and being a particularly healthy shrub with few thorns. | 2013-03-07 |
20130061359 | Rosa hybrida shrub named 'AUSrapper' - A variety of rose plant of the shrub class, named ‘AUSrapper’. The ‘AUSrapper’ rose is a plant having beautiful full-petalled, cup-shaped blooms, having at the center of each bloom a button eye of small inward folding petals, an opening color that is a soft creamy apricot, which quickly fades to cream and then to pure white, and a fragrance that is pure myrrh and of medium strength. The petals of the flower drop very cleanly and it forms a most attractive, bushy, but relatively upright shrub that is extremely healthy. | 2013-03-07 |
20130061360 | Buddleia plant named 'Hinebud1' | 2013-03-07 |
20130061361 | Heuchera plant named 'Delta Dawn' - A new and distinct | 2013-03-07 |